Statements (26)
Predicate | Object |
---|---|
gptkbp:instanceOf |
network attack
cybersecurity attack |
gptkbp:detects |
intrusion detection systems
network monitoring |
gptkbp:effect |
network disruption
clients receive incorrect IP configuration clients use attacker-controlled gateway |
gptkbp:exploits |
DHCP protocol vulnerabilities
|
gptkbp:goal |
intercept sensitive information
perform man-in-the-middle attacks redirect network traffic |
https://www.w3.org/2000/01/rdf-schema#label |
DHCP Spoofing Attacks
|
gptkbp:method |
attacker acts as rogue DHCP server
attacker sends forged DHCP responses |
gptkbp:prevention |
port security
network segmentation DHCP snooping |
gptkbp:relatedTo |
gptkb:ARP_spoofing
man-in-the-middle attack |
gptkbp:target |
Dynamic Host Configuration Protocol (DHCP)
|
gptkbp:threats |
network availability
network integrity network confidentiality |
gptkbp:used_in |
penetration testing
|
gptkbp:bfsParent |
gptkb:DHCP_Snooping
|
gptkbp:bfsLayer |
7
|