Finding And Stopping Rogue DHCP Servers On MikroTik

แชร์
ฝัง
  • เผยแพร่เมื่อ 20 ก.ค. 2024
  • Hey there, this video will be looking at how to show you how to find rogue DHCP servers on your network. We will see how we can potentially stop these rogue servers from issuing out IP addresses to the network by using the DHCP Snooping feature on MikroTik.
    👊Thanks for taking time to watch my video. If you could, pressing LIKE and SUBSCRIBING helps more people discover my videos. Feel free to leave a comment for any other topics you would like to see me cover or what your general opinion is of the video.
    🕘Timestamps🕘
    📕00:00 - Introduction
    📕00:23 - Topology Overview
    📕01:56 - Finding Rogue Servers (Wireshark)
    📕04:12 - Configuring DHCP Alerts
    📕07:30 - DHCP Snooping configuration
    📕11:18 - Conclusion
    Support the Channel:
    ⭐Become a Patreon: / thenetworkberg
    ⭐Become a TH-cam Member: / @thenetworkberg
    Social Media:
    🌏 / thenetworkberg
    🌏 / bergnetwork
    🌏 / the-network-berg-39451...
    MTCRE Playlist:
    • Free MTCRE RoSv6
    MTCNA Playlist:
    • Free MTCNA RoSv6
    Credits:
    Thumbnail: Created on Canva
    Intro: Created on Canva
    Music by Alumo
    Songs used:
    Dioitic
    Outland 85
    Music by Bensound.com/free-music-for-videos
    • Bensound: "The Elevato...
    Thanks again for watching

ความคิดเห็น • 57

  • @TheNetworkBerg
    @TheNetworkBerg  ปีที่แล้ว +1

    Pinning this comment with the relevant MikroTik help docs:
    help.mikrotik.com/docs/display/ROS/Bridging+and+Switching#BridgingandSwitching-DHCPSnoopingandDHCPOption82

  • @drumer2142
    @drumer2142 ปีที่แล้ว +2

    Very useful. Thank you so much for teaching us thing like this 💪

  • @ahsanmuhammad7428
    @ahsanmuhammad7428 ปีที่แล้ว +2

    Perfect explanation and demo !

  • @amaralarama
    @amaralarama ปีที่แล้ว +1

    great video and hell of a t-shirt my man 👍

  • @trexx_media
    @trexx_media ปีที่แล้ว +4

    ANOTHER INFORMATIVE VIDEO .....

  • @Joshv918
    @Joshv918 ปีที่แล้ว +1

    Mikrotik shouted you out!! Pretty cool! Love your videos

  • @javiermacias5299
    @javiermacias5299 ปีที่แล้ว

    Thanks for the video, really useful

  • @petrmiskerik
    @petrmiskerik ปีที่แล้ว

    Awesome, just awesome content. Thx man ♥

  • @anasa.ghannam9302
    @anasa.ghannam9302 ปีที่แล้ว +1

    thanx man, very useful explanation, and nice Sepultura shirt)))))))

  • @Red1Wollip
    @Red1Wollip 10 หลายเดือนก่อน

    Another GREAT VIDEO!

  • @reanitkhmer3325
    @reanitkhmer3325 ปีที่แล้ว

    appreciated your video brother.

  • @JasonsLabVideos
    @JasonsLabVideos ปีที่แล้ว +1

    Awesome video !!

  • @vedatyilmaz4577
    @vedatyilmaz4577 ปีที่แล้ว +1

    great as usual.

  •  ปีที่แล้ว +1

    Thank you this with security awernes seams to increase a lot. How about a video to collect and manage logs from the Mikrotik? Line ntopt, greylog and others to detect and prevent intrusion.

  • @drumaddict89
    @drumaddict89 ปีที่แล้ว +1

    nice and compact info to cover a lot of topics (especially snooping!)
    thanks for that ... but please give the mic some space ;)

  • @kresimirpecar4925
    @kresimirpecar4925 ปีที่แล้ว +3

    Great video as always, very informative :D I would like to have push notification from the router... Instead of e-mail... I hope mikrotik do something about that... Aruba switches for eg can be managed from the cloud... (I think that notification are enough)

    • @drumer2142
      @drumer2142 ปีที่แล้ว +1

      In Mikrotiks forum there are a lot of scripts for push notif to email, discord ... etc

  • @mathphy_rk
    @mathphy_rk ปีที่แล้ว

    Very good explanation, may I know what tools you are using in the dashboard?

  • @ruyfranca8756
    @ruyfranca8756 ปีที่แล้ว

    Thank you

  • @sep_sh
    @sep_sh 4 หลายเดือนก่อน

    Nice thumbnail

  • @zadekeys2194
    @zadekeys2194 5 หลายเดือนก่อน

    Easiest eay to wirelessly take down a network you are testing - mikrotik as wireless bridge ; once you have internet, then on the wireless bridge enable the dhcp server for the same range and scope as the network youre connecting to... Boom, network will go down and if the core router is rebooted, the Mikrotik will reconnect and the fun will happen again.. as a PoC, you can run the Mikrotik off of a power bank, using a 5v to 12v usb to DC barrel jack cable.

  •  ปีที่แล้ว

    Chaos A.D , nice 😁

  • @pedro_8240
    @pedro_8240 7 หลายเดือนก่อน +2

    4:39 or, or, or, you do one even better, if your device has a piezo buzzer you could play Seek & Destroy.

  • @AhmadAhmad-jf3wb
    @AhmadAhmad-jf3wb ปีที่แล้ว

    hello
    great lesson
    can u make lesson about best traffic shapping in mikrotik
    best regards

  • @oliver1121
    @oliver1121 ปีที่แล้ว +1

    That was all well and good, but how do you protect it if they keep using smokebomb and vanish?

  • @andrieshrr
    @andrieshrr ปีที่แล้ว

    Great video! What kind of virtualisation software are you using?

    • @TheNetworkBerg
      @TheNetworkBerg  ปีที่แล้ว

      I use VMWare Pro as a hypervisor and the emulation VM I am running is EVE-NG

  • @jessebustamante6620
    @jessebustamante6620 ปีที่แล้ว +2

    Love your shirt!!! Love your content! Keep it metal!! Keep it nerd! Don't change!
    #CHAOS_AD

  • @salembaabbad8783
    @salembaabbad8783 10 หลายเดือนก่อน +1

    U R Super Pro Expert 😊

    • @TheNetworkBerg
      @TheNetworkBerg  10 หลายเดือนก่อน +1

      Thank you for the kind words

  • @aaronfish2691
    @aaronfish2691 ปีที่แล้ว

    Love that shirt! Chaos AD!

    • @TheNetworkBerg
      @TheNetworkBerg  ปีที่แล้ว

      🤘Yeah I love Sepultura! Wish I was a bit older when Max came to South Africa in 2004 with SoulFly, sadly my conservative parents wouldn't allow a 15 year old to a metal concert :P

    • @aaronfish2691
      @aaronfish2691 ปีที่แล้ว

      @@TheNetworkBerg I saw Max a number of times with SoulFly. It was definitely something special. I didn't see Sepultura when he was there, unfortunately. I remember when my older brother brought home the first Nailbomb album - thats some good stuff if you haven't heard of it!

  • @jonpinkley2844
    @jonpinkley2844 ปีที่แล้ว

    Do you know how this protection is done on the switch-port level? Is it using an "extended" ACL in the switch to block DHCP offers?

  • @PhamTienPhong
    @PhamTienPhong 2 หลายเดือนก่อน

    I'm using router on a stick model so I also have VLAN joined a Bridge at Router. Is it necessary to enable DHCP Snooping on Router's Bridge and trust Router's ether2?

  • @ubi6874
    @ubi6874 8 หลายเดือนก่อน

    My scenario is a mk router, with another oem poe switch connected on port 3. The switch hosts my APs. An extender connected to the network to boost signal to grey area is behaving as a rogue server. What do you advise for dhcp snooping since it's only one port that's connected to the mk device ?

  • @espeyskop792
    @espeyskop792 8 หลายเดือนก่อน

    hi very useful. If you are willing to share also the topic with option 82, it will help a lot. advance thanks.

    • @espeyskop792
      @espeyskop792 8 หลายเดือนก่อน

      additional question. if you are using option 82, you can use at least 2 switches or like you said you need more 1 router for additional requirement?

  • @shunorrr
    @shunorrr ปีที่แล้ว +1

    can you do this with pfsense?

  • @AlanMillerFencepost
    @AlanMillerFencepost ปีที่แล้ว

    Would a rogue DHCP server on one of the switches still respond but be blocked? Could the switch then detect and log? Thinking about ways to block them from acting while still being able to detect them because it's an indicator of a problem.

  • @antoniocerasuolo757
    @antoniocerasuolo757 5 หลายเดือนก่อน

    hi if i have 3 LAN bridges each one with its own DHCP server should i create 3 emntries under ALERTS? or do i need to create one Alert and put all 3 DHCP servers in there??

  • @josepharueyingho9417
    @josepharueyingho9417 8 หลายเดือนก่อน

    Please I would really love to write scripts on my Mikrotik router, How do I go about doing that??

  • @marn200
    @marn200 ปีที่แล้ว

    Wait im new here. 2:15 is a wireshark link integrated into the mikrotik soft/hardware? how did that work?

    • @TheNetworkBerg
      @TheNetworkBerg  ปีที่แล้ว

      Unfortunately not, in this instance Wireshark is integrated with EVE-NG the network emulation software (VM) that I am running to build this topology. What makes this cool is that you run wireshark against any node so I can see the same results on a Cisco, Juniper, Huawei, HPE, etc.

  • @LoveJoyPeaceAndHopeForAll
    @LoveJoyPeaceAndHopeForAll ปีที่แล้ว

    what is the drawing tool used here?

    • @TheNetworkBerg
      @TheNetworkBerg  ปีที่แล้ว

      It is a network emulator called EVE-NG, you can download and install it on a Virtual Machine, it does the same thing as GNS3. You build virtual networks that work like real networks (Because they are real images) to get a better understanding of how to configure or build your networks.

  • @over-klen
    @over-klen ปีที่แล้ว

    Are you sure that port 2 on switch 1 should be made trusted? What if the rogue server connects instead of the second switch?

    • @TheNetworkBerg
      @TheNetworkBerg  ปีที่แล้ว

      Then the rogue server will be able to do DHCP again, but this would mean the rogue user would need access to the physical switches and if random people can walk into switching cabinets you have more serious security concerns.
      You would also quickly pick up if half your network drops because a malicious person unplugged a switch.

    • @BattousaiHBr
      @BattousaiHBr ปีที่แล้ว

      @@TheNetworkBerg i just checked the documentation, apparently sw1 ether2 would only have trusted=yes _if_ both sw1 and sw2 are using dhcp option 82, otherwise i'm assuming it would be trusted=no
      this is because when option 82 is enabled for the bridge, it will automatically discard any packet received on untrusted ports if they have an option 82 field.
      no mention on behavior of when option 82 is disabled for the receiving device, but i'm assuming it accepts any dhcp client regardless of option 82 field present or not on untrusted ports and only discards dhcp servers.

  • @ch3vr0n123
    @ch3vr0n123 ปีที่แล้ว

    is by default dhcp snooping rejection loged? cisco do log by default

    • @raajseeker
      @raajseeker ปีที่แล้ว

      Yes you can do it on SW😊

  • @Johann75
    @Johann75 ปีที่แล้ว

    But why not simply isolate all users on Wi-Fi?

  • @1vanch0
    @1vanch0 ปีที่แล้ว +1

    Refuse/resist rogue dhcp chaos servers ad!

  • @Anavllama
    @Anavllama ปีที่แล้ว

    If anyone added a rogue router to a work network, then that person would a. be out of a job and b. behind bars LOL not likely, but very possible at a home network.

    • @BattousaiHBr
      @BattousaiHBr ปีที่แล้ว

      what actually happens is technicians testing replaced commodity routers by connecting it to the local network and not realizing these come with a DHCP server by default, and then wonder why others start complaining that the network stopped working.

  • @miltonesss
    @miltonesss 9 หลายเดือนก่อน

    Very useful... thank you so much!