Dynamic Host Configuration Protocol (DHCP): 67, 68

Security Weaknesses:

  • Lack of authentication makes it vulnerable to spoofing attacks.

  • Susceptible to DHCP starvation attacks using rogue DHCP servers.

  • Potential to be exploited for man-in-the-middle (MITM) attacks.

  • Can be used to distribute malicious configurations to clients.

Security Defense and Mitigation Measures:

  • Implement DHCP Snooping to filter untrusted messages.

  • Use network segmentation and VLANs to isolate DHCP traffic.

  • Enable port security to limit the number of MAC addresses per port.

  • Monitor and configure authorized DHCP servers.

Indicators of Compromise or Attack:

  • Multiple DHCP Discover messages from a single MAC address (starvation).

  • Unexpected or rogue DHCP servers appearing on the network.

  • Unusual or suspicious IP configurations on clients.

Last updated