Discover a rogue DHCP Server (credit to MindTap)
You are the security analyst for a small corporate network. Several employees have reported that they are unable to connect to the network. They all seem to be getting bad IP address information from a rogue DHCP server.
In this lab, your task is to identify the rogue DHCP server using Wireshark:
- Use Wireshark to capture and filter DHCP traffic.
- Disable and enable the enp2s0 network interface to request a new IP address from DHCP.
- Find the rogue and legitimate DHCP servers.
- Answer the questions.
Use bootp in Wireshark to isolate DHCP traffic.
Complete this lab as follows:
- Use Wireshark to capture and filter DHCP traffic.
- From the Favorites bar, select Wireshark.
- Under Capture, select enp2s0.
- Select the blue fin to start a Wireshark capture.
- In the Apply a display filter field, type bootp and press Enter.
- Disable and enable the enp2s0 network interface.
- From the Favorites bar, select Terminal.
- At the prompt, type ip addr show and press Enter to view the current IP configuration.
- Type ip link set enp2s0 down and press Enter.
- Type ip link set enp2s0 up and press Enter to enable the interface and request an IP address from the DHCP server.
- Locate the rogue and legitimate DHCP servers.
- Maximize the Wireshark window for better viewing.
- In Wireshark, under the Source column, find the IP addresses of the rogue and legitimate DHCP servers that sent the DHCP Offer packets.
- In the top right, select Answer Questions.
- Answer the questions.
- Select Score Lab.
Comments
Post a Comment