Mitigation of DHCP Starvation Attack Last Updated : 23 Jul, 2025 Comments Improve Suggest changes 1 Likes Like Report In a DHCP starvation attack, an attacker creates spoofed DHCP requests with the goal of consuming all available IP addresses that a DHCP server can allocate. This attack targets DHCP servers. The attack could deny service to authorized network users. In other words, a malicious cyberattack that targets DHCP servers is known as a starvation attack. An adversarial actor bombards a DHCP server with false DISCOVER packets during a DHCP assault until the service runs out of IP addresses. Once that occurs, the attacker can refuse service to authorized network users or even provide a different DHCP connection that can result in a Man-in-the-Middle (MITM) attack. DHCP Process:It is the role of the Dynamic Host Configuration Protocol server is to assign IP addresses to networked devices. To do this, each DHCP client and DHCP server exchange packets. The four packet types that make up the DHCP IP address assignment operation are DISCOVER, OFFER, REQUEST, and ACKNOWLEDGMENT. If the PC is a DHCP client, it will send a DHCP DISCOVER packet when it first connects to the network. This basically boils down to a PC saying, "I just got here, hi! A Dynamic Host Configuration Protocol server that can assign IP addresses is what I'm looking for."If you imagine a client on your network connecting to a nearby server, you can imagine the server responding with an OFFER. Also, as part of this offer, you will be provided with a client-approved IP address. In fact, that server responded, "Welcome, I can give you a little spot on 10.123.0.1. Are you interested?"The maximum number of IP addresses that can be pooled on a /24-bit network is 254.Some of these addresses may be kept as static router addresses or for other purposes. Therefore, the DHCP server's pool of available addresses can only contain about 252 IP addresses. The DHCP server selects one of the available IP addresses from the pool and reserves it for new clients when it receives a DISCOVER packet.The client should return the REQUEST after receiving the OFFER packet. Basically, the client said, "That's really ideal. Can you grant me exclusive access to 10.123.0.1 while I'm here?"The transaction is complete when the server sends an ACKNOWLEDGMENT packet to the client and all other listeners. This basically says "You are currently on 10.123.0.1. It will be held on 10.123.0.1 in case someone needs to contact this client."The DHCP setup is a productive technique that allows customers to join and leave networks in a non-hostile configuration.Working:The DHCP starvation attack uses this system. In a DHCP starvation attack, a malicious actor sends a flood of fictitious DISCOVER packets, depleting the entire pool of available packets, which he determines to the DHCP server. The customer looked up the IP address and found none available and was turned down. You may even look for alternative DHCP servers that may be provided by hostile actors. This hostile actor can now see all the traffic that the client is sending or receiving using the IP address as hostile or spoofed. A computer broadcasting a DHCP DISCOVER packet could be in a hostile environment if a malicious computer uses a tool like Yersinia.This malicious client sends hundreds, not a handful, of malicious DISCOVER packets, using a bogus and hoaxed MAC address as the source MAC address for each request.When a DHCP server responds to each of these spoofed DHCP DISCOVER packets, the entire IP address pool is depleted and its DHCP server runs out of IP addresses to serve valid DHCP requests. Once the DHCP server has exhausted IP addresses, the attacker will then typically turn on their own DHCP server. This malicious DHCP server then starts handing out IP addresses.The advantage for the attacker is that if the fake DHCP server uses the IP address along with the default output DNS and gateway information, any client using these IP addresses and starting to use this default gateway will not be able to access the attacker's computer. One adversary actor is all that is needed for a man-in-the-middle (MITM) attack to succeed.Functions of DHCP Starvation Attack:When a DHCP server is overloaded with requests for IP addresses from legitimate clients, it suffers from a DHCP starvation attack, which results in a denial of service (DoS). After a DHCP exhaust attack, a man-in-the-middle (MITM) attack attempt is frequently launched.After the DHCP server has handed out all IP addresses, what happens when a new DHCP client needs or wants an IP address and joins the network? DoS or Denial of Service is the obvious answer. No IP addresses are available.For this reason, after a DHCP starvation attack, attackers often come back with their own DHCP server and start handing out IP addresses. And cause more disruption to user traffic. Specifically, if an attacker performs a man-in-the-middle attack, in this case, traffic from devices trying to leave the subnet will pass through the attacker's device. The attacker is in the path of the intended target.Mitigation:Attacks using DHCP starvation are easy to implement. Port security is a way to mitigate the effects of this type of attack. Avoid DHCP starvation attacks with advanced cybersecurity training. Your network is instantly vulnerable to DHCP exhaustion attacks. The key to preventing such attacks and maintaining network security is finding ways to prevent hostile actors from flooding DHCP servers with forged DISCOVER packets, preventing them from offering IP addresses to legitimate clients. Comment A annieahujaweb2020 Follow 1 Improve A annieahujaweb2020 Follow 1 Improve Article Tags : Technical Scripter Ethical Hacking Technical Scripter 2022 Ethical Hacking - Network Attacks Explore Ethical Hacking Tutorial 13 min read Introduction to Ethical HackingWhat is Hacktivism ? 11 min read The Hackers Methodology 4 min read Remote Access in Ethical Hacking 5 min read Information Gathering Tools for Kali Linux 5 min read ARIN in Ethical Hacking 3 min read Characteristics of Computer Networks 5 min read Foot Printing and ReconnaissanceWhat is DNS Footprinting? 6 min read Footprinting Through Search Engines 5 min read What is Whois Footprinting? 4 min read Footprinting Using Social Engineering Method 4 min read Scanning NetworksWhat is Credentialed Vulnerability Scan? 4 min read What are Scanning Attacks? 7 min read Malware Scan in Ethical Hacking 5 min read What is Running of a Malware Scan? 5 min read WAScan - web application security scanner in Kali Linux 2 min read What is TCP-ACK Scanning? 2 min read Port Scanning Techniques By Using Nmap 5 min read What is SYN Scanning? 3 min read What is UDP Scanning? 2 min read EnumerationCyber Security - Types of Enumeration 13 min read What is DNS Enumeration? 3 min read SMTP Enumeration 2 min read LDAP Enumeration 6 min read What is NTP Enumeration? 4 min read What is IPsec Enumeration? 4 min read What is NetBIOS Enumeration? 5 min read SNMP Enumeration 7 min read What is Security Testing in Enumeration? 4 min read System HackingWhat is System Hacking in Ethical Hacking? 2 min read What is Windows Hacking ? 6 min read Importance of Physical Security in Ethical Hacking 3 min read What is Non-Electronic Password Attack on a System? 3 min read Password Guessing Attack 5 min read Credential Stuffing in Ethical Hacking 2 min read Reverse Brute Force Attack in System Hacking 4 min read Brute Force Attack 2 min read What is a Default Password Attack Threat? 3 min read USB Drop Attack in System Hacking 5 min read What is Sniffing Attack in System Hacking? 4 min read How to Prevent Man In the Middle Attack? 5 min read How To Generate Rainbow Table Using WinRTGen? 4 min read What is Elcomsoft Distributed Password Recovery? 4 min read pwdump7 in System Hacking 3 min read FGDUMP in System Hacking 5 min read Password Auditing With L0phtcrack 7 Tool 5 min read What is Salted Password Hashing? 4 min read How to Defend Against Password Cracking of Systems? 6 min read How to Defend Against Wi-Fi Pineapple? 6 min read What is DLL Hijacking? 8 min read How to Prevent Privilege Escalation? 4 min read Malware AnalysisMost Popular Methods Used By Hackers to Spread Ransomware 3 min read What is Malvertising? Working and Examples 8 min read How to Find Trojan on Computers? 4 min read Malwares - Malicious Software 8 min read What is WannaCry and How does WannaCry ransomware works 5 min read Working of Stuxnet Virus 6 min read CryptoLocker Ransomware Attack 4 min read Storm Worm 3 min read What is Zeus Malware? 8 min read What is SQL Slammer Virus? 2 min read How to Install Trojan Virus on Any Computer? 5 min read Different Ways to Remove Trojan Horse Malware 5 min read How to Defend Against Botnets ? 5 min read What is Proxy Trojan? 3 min read What are Banking Trojans? 3 min read What is a Computer Virus? 9 min read Virus Hoax 2 min read Difference between Worms and Virus 5 min read Port Scanning Attack 3 min read What is System Integrity Check? 6 min read Code Emulation Technique For Computer Virus Detection 5 min read Heuristic Virus 6 min read How to Prevent Backdoor Attacks? 3 min read SniffingWhat are Active Sniffing Attacks? 6 min read What is Protocol Analyzer? 3 min read What is MAC Spoofing Attack? 5 min read How to Prevent MAC Flooding? 4 min read What is Port Stealing? 3 min read Dynamic Host Configuration Protocol (DHCP) 8 min read DHCP Starvation Attack 4 min read What is Rogue DHCP Server Attack? 4 min read What is ARP Spoofing Attack? 3 min read How to Prevent DNS Poisoning and Spoofing? 6 min read DNS Spoofing or DNS Cache poisoning 3 min read How to Detect Sniffer in Your Network? 5 min read Mitigation of DHCP Starvation Attack 5 min read Social EngineeringWhat is Social Engineering? Working, Types, Prevention and Impact 8 min read What is Insider Attack? 6 min read What is an Impersonation Attack? 6 min read What are Tailgating? 5 min read How Hackers Use Social Engineering to Get Passwords on Facebook? 4 min read Pretexting in Social Engineering 4 min read Credit Card Frauds 2 min read Active Social Engineering Defense (ASED) 6 min read Cyber Crime - Identity Theft 5 min read Penetration Testing - Software Engineering 9 min read Denial-of-ServiceDistributed Denial of Service DDoS attack 6 min read What are Bandwidth Attacks? 6 min read HTTP Flood Attack 9 min read ICMP Flood DDoS Attack 12 min read Ping Flood Attack 6 min read What is a Permanent DoS (PDoS) Attack? 6 min read What is Phlashing? 4 min read Like