- Which DHCP configuration options (IP, DNS, etc) are attackersinterested in forging to be able to sniff and manipulate networktraffic? There are mainly 3 that areuseful.
- Why is it useful (for the attacker) to perform DHCP starvationattack against legitimate DHCP server(s) before attempting DHCPspoofing?
Expert Answer
An answer will be send to you shortly. . . . .