Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and protection against these techniques

Date: 26/03/2023

Chances are high that you had dealt with DHCP when configuring a router. But are you aware of risks arising if this protocol is misconfigured on a company’s server? Using its misconfigurations, not only can a hacker disable the DHCP server, but also deliver an MITM attack and intercept critical data. This article discusses two attack vectors targeting DHCP and provides important security recommendations.
Read full article →

Nightmare Spoofing. Evil Twin attack over dynamic routing

Date: 03/03/2023

Attacks on dynamic routing domains can wreak havoc on the network since they disrupt the routing process. In this article, I am going to present my own modification of the Evil Twin attack designed to intercept data in OSPF-based networks. I will also demonstrate how to connect to an offline system, bypass authentication, and perform a malicious LSU injection.
Read full article →