Statements (26)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:network_attack
gptkb:cybersecurity_attack |
| gptkbp:detects |
intrusion detection systems
network monitoring |
| gptkbp:effect |
network disruption
clients receive incorrect IP configuration clients use attacker-controlled gateway |
| gptkbp:exploits |
DHCP protocol vulnerabilities
|
| gptkbp:goal |
intercept sensitive information
perform man-in-the-middle attacks redirect network traffic |
| gptkbp:method |
attacker acts as rogue DHCP server
attacker sends forged DHCP responses |
| gptkbp:prevention |
port security
network segmentation DHCP snooping |
| gptkbp:relatedTo |
gptkb:ARP_spoofing
man-in-the-middle attack |
| gptkbp:target |
Dynamic Host Configuration Protocol (DHCP)
|
| gptkbp:threats |
network availability
network integrity network confidentiality |
| gptkbp:used_in |
penetration testing
|
| gptkbp:bfsParent |
gptkb:DHCP_Snooping
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
DHCP Spoofing Attacks
|