This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
networking:dhcp_find_rogue [2018/07/20 11:22] gcooper created |
networking:dhcp_find_rogue [2018/07/20 12:46] (current) gcooper |
||
---|---|---|---|
Line 3: | Line 3: | ||
===== DHCP Process ===== | ===== DHCP Process ===== | ||
- | DORA: | + | **DORA** |
- | - Discover | + | - **Discover** |
- | - Offer | + | * Client |
- | - Request | + | - **Offer** |
- | - Acknowledge | + | * Server |
+ | - **Request** | ||
+ | * Client | ||
+ | - **Acknowledge** | ||
+ | * Server | ||
+ | ===== Capture the Process ===== | ||
+ | - Note the IP address of valid DHCP server | ||
+ | * See DHCP Release packet from working client | ||
+ | - Start Wireshark | ||
+ | - '' | ||
+ | - '' | ||
+ | - Save the capture | ||
+ | * '' | ||
+ | ===== Analyze the Capture ===== | ||
+ | |||
+ | In Wireshark: | ||
+ | |||
+ | - **Open** the '' | ||
+ | - **Filter** on '' | ||
+ | * Shows DORA | ||
+ | - **Filter** on '' | ||
+ | * Shows DHCP Offer packets | ||
+ | |||
+ | ===== Track It Down ===== | ||
+ | |||
+ | From a CMD prompt, you can check for: | ||
+ | |||
+ | * Reverse DNS info | ||
+ | * Find the MAC address | ||
+ | * Check for NETBIOS name | ||
+ | |||
+ | < | ||
+ | nslookup <IP of rogue DHCP server> | ||
+ | </ | ||
+ | |||
+ | < | ||
+ | ping <IP of rogue DHCP server> | ||
+ | arp -a | ||
+ | </ | ||
+ | |||
+ | < | ||
+ | nbtstat -A <IP of rogue DHCP server> | ||
+ | </ | ||
+ | |||
+ | Knowing the manufacturer of the rogue device might help, once you know the MAC address. | ||
+ | |||
+ | https:// | ||
+ | |||
+ | Finally, use ' |