DHCP Dynamic Host Configuration Protocol
DHCP Dynamic Host Configuration Protocol
DHCP, the client and the server exchange mainly 4 DHCP messages in order to
make a connection, also called DORA process, but there are 8 DHCP messages
in the process.
===========================================================
===========================================================
==========================================
Reservations are typically given to special devices like network printers,
routers, server, etc.
Advantages:
● centralized management of IP addresses
● ease of adding new clients to a network
● reuse of IP addresses reducing the total number of IP addresses that
are required
● simple reconfiguration of the IP address space on the DHCP server
without needing to reconfigure each client
Disadvantages:
– DHCP protocol doesn’t require authentication which leads Man-in-
Middle or DoS attack
– DHCP server does not have a backup and the server fails, so do the
devices served by it.
– DHCP servers have also been the subject of multiple memory
corruption vulnerabilities. In these, attackers have targeted the
Windows DHCP Server service. When successful, the attacks can lead
to a full compromise of Microsoft Active Directory (AD). One such
vulnerability, patched by Microsoft, was the Common Vulnerabilities
and Exposures (CVE)-2019-0725 Windows DHCP Server Remote
Code Execution (RCE) Vulnerability.
The DHCP relay will manage requests between DHCP clients and servers.
Typically, relays are used when an organization has to handle large or complex
networks