Esc
DHCP Spoofing - T1557.003
(ATT&CK® Technique)
Definition
Adversaries may redirect network traffic to adversary-owned systems by spoofing Dynamic Host Configuration Protocol (DHCP) traffic and acting as a malicious DHCP server on the victim network. By achieving the adversary-in-the-middle (AiTM) position, adversaries may collect network communications, including passed credentials, especially those sent over insecure, unencrypted protocols. This may also enable follow-on behaviors such as Network Sniffing or Transmitted Data Manipulation.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.