This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
networking:dhcp_find_rogue [2018/07/20 12:27] gcooper |
networking:dhcp_find_rogue [2018/07/20 12:46] (current) gcooper |
||
---|---|---|---|
Line 17: | Line 17: | ||
- Note the IP address of valid DHCP server | - Note the IP address of valid DHCP server | ||
+ | * See DHCP Release packet from working client | ||
- Start Wireshark | - Start Wireshark | ||
- '' | - '' | ||
Line 27: | Line 28: | ||
In Wireshark: | In Wireshark: | ||
- | - Open the '' | + | - **Open** the '' |
- | - Filter on '' | + | - **Filter** on '' |
- | - | + | * Shows DORA |
+ | - **Filter** on '' | ||
+ | * Shows DHCP Offer packets | ||
+ | ===== Track It Down ===== | ||
+ | |||
+ | From a CMD prompt, you can check for: | ||
+ | |||
+ | * Reverse DNS info | ||
+ | * Find the MAC address | ||
+ | * Check for NETBIOS name | ||
+ | |||
+ | < | ||
+ | nslookup <IP of rogue DHCP server> | ||
+ | </ | ||
+ | |||
+ | < | ||
+ | ping <IP of rogue DHCP server> | ||
+ | arp -a | ||
+ | </ | ||
+ | |||
+ | < | ||
+ | nbtstat -A <IP of rogue DHCP server> | ||
+ | </ | ||
+ | |||
+ | Knowing the manufacturer of the rogue device might help, once you know the MAC address. | ||
+ | |||
+ | https:// | ||
+ | |||
+ | Finally, use ' |