Skip to content

simulate DHCP spoofing on a virtual network using Mininet

Notifications You must be signed in to change notification settings

floft/dhcp-spoof

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DHCP Spoof

For an Intro to Networking and Computer I/O class, I worked on a project to explore penetration testing. Rather than setting up our own network in the real world, we decided to make this more repeatable by creating a virtual network with Mininet. My portion of the project focused on DHCP spoofing.

Senario: An evil host near the client in the network triest to respond to DHCP requests faster than the real DHCP server and point hosts to its own DNS server allowing it to point people to phishing sites.

Goal: prevent such an attack. Methods experimented with:

  • Block all but the correct DHCP packets on switches with ebtables

  • On the client use dhclient's anycast-mac option to only send the DHCP packets only to the real DHCP server

  • Setup the network manually (not really a solution)

Running

On Arch Linux, install needed packages:

 sudo pacman -S busybox dhclient dnsmasq ettercap iptables ebtables python2-dnslib python2-ipy bridge-utils
 packer -S mininet

Make sure Mininet is functioning properly by verifying 0% packets dropped:

 sudo mn --switch lxbr --controller none --test pingall

Run DHCP Spoof:

 sudo python2 dhcp_spoof.py wlp2s0 0

If it ever exits without cleaning everything up, just run:

sudo mn -c

Note: If you use this on anything other than Arch Linux, you'll likely have to tweak the code.

Code

References

About

simulate DHCP spoofing on a virtual network using Mininet

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages