DHCP Spoofing (T1557.003)

View on ATT&CK

In Playbook

Associated Tactics

  • Credential Access
  • Collection

Credential Access (TA0006)

The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

View on ATT&CK

Procedure Examples

Description Source(s)
Droms, R. (1997, March). Dynamic Host Configuration Protocol. Retrieved March 9, 2022. rfc2131
Irwin, Ullrich, J. (2009, March 16). new rogue-DHCP server malware. Retrieved January 14, 2022. new_rogue_DHCP_serv_malware
J. Bound, et al. (2003, July). Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Retrieved June 27, 2022. rfc3315
Microsoft. (2006, August 31). DHCP Server Operational Events. Retrieved March 7, 2022. dhcp_serv_op_events
Shoemaker, E. (2015, December 31). Solution: Monitor DHCP Scopes and Detect Man-in-the-Middle Attacks with PRTG and PowerShell. Retrieved September 12, 2024. solution_monitor_dhcp_scopes
Symantec. (2009, March 22). W32.Tidserv.G. Retrieved January 14, 2022. w32.tidserv.g