Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 312

DHCP Spoofing

What is DHCP Spoofing?

DHCP SpoofingAn attack in which an adversary replies to DHCP requests with crafted offers to push a malicious gateway, DNS server, or other options to victim clients.


DHCP spoofing happens when an attacker on the same broadcast domain answers DHCPDISCOVER or REQUEST messages faster than - or instead of - the legitimate DHCP server, delivering a forged DHCPOFFER/ACK. The forged configuration typically sets the attacker as the default gateway and DNS resolver, enabling on-path traffic interception, credential capture, TLS downgrade attempts, or DNS redirection. Spoofing is most effective when combined with DHCP starvation that disables the real server. It is a foundation of many MITM kits, including Ettercap and Bettercap. Defenses: DHCP snooping with trusted ports for real servers, Dynamic ARP Inspection, IP Source Guard, RA Guard for IPv6 equivalents, and network segmentation to limit broadcast domains.

Examples

  1. 01

    Bettercap's dhcp.spoof module handing out a 192.168.1.66 gateway pointing to the attacker.

  2. 02

    Pushing an attacker DNS (e.g., 198.51.100.10) so HTTP requests are redirected to a phishing site.

Frequently asked questions

What is DHCP Spoofing?

An attack in which an adversary replies to DHCP requests with crafted offers to push a malicious gateway, DNS server, or other options to victim clients. It belongs to the Attacks & Threats category of cybersecurity.

What does DHCP Spoofing mean?

An attack in which an adversary replies to DHCP requests with crafted offers to push a malicious gateway, DNS server, or other options to victim clients.

How does DHCP Spoofing work?

DHCP spoofing happens when an attacker on the same broadcast domain answers DHCPDISCOVER or REQUEST messages faster than - or instead of - the legitimate DHCP server, delivering a forged DHCPOFFER/ACK. The forged configuration typically sets the attacker as the default gateway and DNS resolver, enabling on-path traffic interception, credential capture, TLS downgrade attempts, or DNS redirection. Spoofing is most effective when combined with DHCP starvation that disables the real server. It is a foundation of many MITM kits, including Ettercap and Bettercap. Defenses: DHCP snooping with trusted ports for real servers, Dynamic ARP Inspection, IP Source Guard, RA Guard for IPv6 equivalents, and network segmentation to limit broadcast domains.

How do you defend against DHCP Spoofing?

Defences for DHCP Spoofing typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for DHCP Spoofing?

Common alternative names include: DHCP option spoofing, Fake DHCP reply.

Related terms

See also