DHCP (Dynamic Host Configuration Protocol) automates network configuration. In this attack, an unauthorized DHCP server impersonates a legitimate one, often responding first to broadcast DHCP DISCOVER requests.
rogue-dhcp layer3-tryst-abuse network-redirection host-network-triage broadcast-infrastructure-attacks
-
Updated
May 19, 2025 - Jupyter Notebook