Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> General >> DHCP server info gathering


Vulnerability Assessment Details

DHCP server info gathering

Vulnerability Assessment Summary
Chats with the remote DHCP server

Detailed Explanation for this Vulnerability Assessment

This script contacts the remote DHCP server (if any) and
attempts to retrieve information about the network layout.

Some DHCP server provide sensitive information such
as the NIS domain name, or network layout information
such as the list of the network www servers, and so on.

It does not demonstrate any vulnerability, but
a local attacker may use DHCP to become intimately familiar
with the network in no time.

Solution : Apply filtering to keep this information off the network
Network Security Threat Level: Low

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 Renaud Deraison

Cables, Connectors

NEW Intel Core I7-6700K Unlocked 4.00 GHz 8M Processor Cache 4 LGA 1151
$279.98
NEW Intel Core I7-6700K Unlocked 4.00 GHz 8M Processor Cache 4 LGA 1151 pictureIBM 43X5252 Intel Xeon E5520 Quad-Core 2.26 GHz Processor - L3: 8 MB
$16.24
IBM 43X5252 Intel Xeon E5520 Quad-Core 2.26 GHz Processor - L3: 8 MB pictureHP 17-x008ds Intel N3710 Quad-Core, 8GB, 17.3” Touchscreen LED, Win 10 Notebook
$300.0
HP 17-x008ds Intel N3710 Quad-Core, 8GB, 17.3” Touchscreen LED, Win 10 Notebook  pictureLenovo ThinkStation S30 E5-1620v2 Quad-Core 3.7GHz 8Gb 500Gb K600 Win8.1 x64 #03
$159.95
Lenovo ThinkStation S30 E5-1620v2 Quad-Core 3.7GHz 8Gb 500Gb K600 Win8.1 x64 #03 picture


Discussions

No Discussions have been posted on this vulnerability.