All your IPs are belong to us.
DHCPwn is a tool used for testing
IP exhaustion attacks. It can also be
used to sniff local
DHCP protocol is connectionless and implemented via
UDP. These two
characteristics allow this attack to be performed. Since there is no actual
connection being made between the client and server we can quickly send many
DHCP servers rely on the senders
MAC address to allocate
IP addresses. We can
easily spoof many requests with different, fake
MAC addresses. This will
eventually exhaust the server's ability to assign new
IP addresses. Depending
on the server's method of releasing
IP addresses associated with a given
address this attack will either be more, or less effective. For example, if
a server quickly releases allocations that it doesn't receive responses from,
the attack will be less effective.
This attack is typically considered to be a form of DoS.
$ pip3 install dhcpwn $ dhcpwn -h
$ git clone https://github.com/mschwager/dhcpwn.git $ cd dhcpwn $ pip3 install -r requirements.txt $ python3 dhcpwn.py -h
$ dhcpwn --interface wlan0 flood --count 256
$ dhcpwn --interface wlan0 sniff
$ dhcpwn -h
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.