VIA [
https://bitbucket.org/secdev/scapy/wiki/doc/IdentifyingRogueDHCPServers]

lanzamos python root, y ejecutamos esto:

import socket
from scapy.all import *

conf.checkIPaddr = False
fam,hw = get_if_raw_hwaddr(conf.iface)
dhcp_discover = Ether(dst="ff:ff:ff:ff:ff:ff")/IP(src="0.0.0.0",dst="255.255.255.255")/UDP(sport=68,dport=67)/BOOTP(chaddr=hw)/DHCP(options=[("message-type","discover"),"end"])
ans, unans = srp(dhcp_discover, multi=True) # Press CTRL-C after several seconds

Cuando lleve unos segundos, paramos con CTRL+C y verificamos la respuesta


ans.summary()
for p in ans: print p1Ether.src, p1IP.src


Volver a Hfiel.es
banner