What would happen if an intruder usesd a DHCP spoofing device to send replies to DHCP requests ahead of replies from the real DHCP server?
Is it possible for an attacking device to continually request IP addresses from a real DHCP server with continually changing MAC addresses? (Hint: This is called the DHCP starvation problem.)
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here