13.1.13 Discover a Rogue DHCP Server
Task Summary
Required Actions & Questions
Your answer: 10.10.10.240
Correct answer: 10.10.10.240
Your answer: 192.168.0.14
Correct answer: 192.168.0.14
Explanation
In this lab, your task is to identify the rogue DHCP server using Wireshark:
- Use Wireshark to capture and filter DHCP traffic.
- Disable and enable the enp2s0 network interface to request a new IP address from the DHCP server.
- Find the rogue DHCP server.
- Answer the questions.
Complete this lab as follows:
- Use Wireshark to capture and filter DHCP traffic as follows:
- From the Favorites bar, select Wireshark.
- Under Capture, select enp2s0.
- Select the blue fin to begin a Wireshark capture.
- In the Apply a display filter field, type bootp and press Enter.
- Disable and enable the enp2s0 network interface as follows:
- From the Favorites bar, select Terminal.
- At the prompt, type ip addr show and press Enter to view the current IP configuration.
- Type ip link set enp2s0 down and press Enter.
- Type ip link set enp2s0 up and press Enter to enable the interface and request an IP address from the DHCP server.
- Maximize the window for easier viewing.
- In Wireshark, under the Source column, find the IP addresses of the rogue and legitimate DHCP servers that sent the DHCP Offer packets.
- In the top right, select Answer Questions.
- Answer the questions.
- Select Score Lab.
Comments
Post a Comment