this post was submitted on 08 May 2024
31 points (97.0% liked)

Furry Technologists

1315 readers
1 users here now

Science, Technology, and pawbs

founded 1 year ago
MODERATORS
 

Very interesting exploit of DHCP

top 10 comments
sorted by: hot top controversial new old
[–] [email protected] 12 points 6 months ago (2 children)

All you need to do is compromise a network and setup and authoritative DCHP server. What could go wrong?

[–] [email protected] 3 points 6 months ago (2 children)

I just think its interesting how seemingly unrelated systems can interact in ways that aren't expected

[–] [email protected] 5 points 6 months ago* (last edited 6 months ago)

It is all interesting, but most core network services are jointed at the hip. If you can tamper with one service, you can usually fuck with all of them. Also, DHCP is much more than "gimmie an IP address". It's kinda always been a way to configure almost anything at layer 3 on a host OS.

Calling this an exploit is a bit of a stretch and why they focused on VPN bypass is kind of 'meh' compared to all the rest of the things you could do If you control the routing tables on a client. Hell, if you control DHCP, you control client DNS as well, so that could be fun to abuse too.

This kind of report is almost like saying 'rm -rf' is an exploit after you give someone root access.

Edit: This is a coffee-shop'ish type of attack. I am aware of that.

[–] [email protected] 1 points 6 months ago

How is dhcp unrelated to vpns lol

[–] [email protected] 3 points 6 months ago (2 children)

Unless the network owner themselves are malicious.

[–] [email protected] 3 points 6 months ago

The only time actually use a VPN is when I don't completely trust the network owner...

[–] [email protected] 3 points 6 months ago

Which is ironically one of the primary reasons you’d want to use a VPN. Public WiFi? VPN, to prevent MITM attacks from a spoofed router. Work WiFi on your personal device? VPN, to prevent your employer from spying on your browsing habits during your break time.

[–] [email protected] 3 points 6 months ago

Interesting. I was all ready to ask how having a malicious DHCP server would matter if VPNs also use DHCP to give a client a VPN IP, but I didn't know DHCP could do more than just hand out IPs.

[–] [email protected] 1 points 6 months ago

So long as you keep all of your traffic encrypted, no one'll be able to snoop on it, though they could already see destinations/type of traffic. Anyone who controls a VPN start or end point can see anything that tcpdump can reveal.

[–] [email protected] 0 points 6 months ago

LOL IVE BEEN NEGATING VPNS SINCE 2005