ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Concern Around Hackers Using DHCP Pool

    Scheduled Pinned Locked Moved IT Discussion
    56 Posts 8 Posters 2.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @dafyre
      last edited by

      @dafyre said in Concern Around Hackers Using DHCP Pool:

      @scottalanmiller said:

      Threat level: zero.

      Incoming Phone Call From Agitated Employee Level: 15

      It's a small office. And no one would EVER do this. The thread level is totally non-existent.

      dafyreD 1 Reply Last reply Reply Quote 0
      • dafyreD
        dafyre @scottalanmiller
        last edited by

        @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

        @dafyre said in Concern Around Hackers Using DHCP Pool:

        @scottalanmiller said:

        Threat level: zero.

        Incoming Phone Call From Agitated Employee Level: 15

        It's a small office. And no one would EVER do this. The thread level is totally non-existent.

        So nobody would EVER call if they came into the office and their computer couldn't get on the network?

        scottalanmillerS 1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @dafyre
          last edited by

          @dafyre said in Concern Around Hackers Using DHCP Pool:

          If the only cost is my time, I'll choose mitigation every time. Although I agree with your assessment that if you're using a known insecure IOT device on your network, get it off!

          So you'd like to waste your time mitigating a threat that is a million to one would ever happen and has effectively no penalty even if it does happen?

          This is the "shoot yourself in the face today to avoid a headache tomorrow" problem. More effort to prevent something than if the thing actually happened - and a thing that has no real world chance of happening.

          DashrenderD 1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @dafyre
            last edited by

            @dafyre said in Concern Around Hackers Using DHCP Pool:

            @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

            @dafyre said in Concern Around Hackers Using DHCP Pool:

            @scottalanmiller said:

            Threat level: zero.

            Incoming Phone Call From Agitated Employee Level: 15

            It's a small office. And no one would EVER do this. The thread level is totally non-existent.

            So nobody would EVER call if they came into the office and their computer couldn't get on the network?

            No one would EVER attack a network in this way. It's ridiculous to discuss as an attack vector in a small office.

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller
              last edited by

              Everyone truly believes that customers of a doctor's office will sit in the office, and knowing that they are doing something that will hurt no one and have no useful effect, take the time to try to tie up IP addresses? I'm lost, what motivation do you think people have for this? Why would someone do this? How many of you have seen people do this in the real world?

              dafyreD stacksofplatesS 2 Replies Last reply Reply Quote 0
              • dafyreD
                dafyre @scottalanmiller
                last edited by

                @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                Everyone truly believes that customers of a doctor's office will sit in the office, and knowing that they are doing something that will hurt no one and have no useful effect, take the time to try to tie up IP addresses? I'm lost, what motivation do you think people have for this? Why would someone do this? How many of you have seen people do this in the real world?

                Sad, but true. I had someone doing this on a network with 8k IP addresses. I also have reason to believe they were causing problems at some of my (formerly) local customers as well (but no proof on their neworks).

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @dafyre
                  last edited by

                  @dafyre said in Concern Around Hackers Using DHCP Pool:

                  @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                  Everyone truly believes that customers of a doctor's office will sit in the office, and knowing that they are doing something that will hurt no one and have no useful effect, take the time to try to tie up IP addresses? I'm lost, what motivation do you think people have for this? Why would someone do this? How many of you have seen people do this in the real world?

                  Sad, but true. I had someone doing this on a network with 8k IP addresses. I also have reason to believe they were causing problems at some of my (formerly) local customers as well (but no proof on their neworks).

                  And that person was a customer sitting in the office of a small business where everyone involved could see him and could have him arrested? 8K DHCP on a single lease scope seems like a lot.

                  1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller
                    last edited by

                    And taking up 8K IPs addresses had no effect but to cause a momentary inconvenience that only took a minute to fix?

                    dafyreD 1 Reply Last reply Reply Quote 0
                    • dafyreD
                      dafyre @scottalanmiller
                      last edited by

                      @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                      And taking up 8K IPs addresses had no effect but to cause a momentary inconvenience that only took a minute to fix?

                      Not after I fixed the issue. 🙂

                      And yes, 8k was a lot. This one was a student network, so he could have been anywhere on campus doing it.

                      The off campus places he was doing it to were small shops and yes he could have been caught. Fortunately for him, he was not.

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @dafyre
                        last edited by

                        @dafyre said in Concern Around Hackers Using DHCP Pool:

                        @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                        And taking up 8K IPs addresses had no effect but to cause a momentary inconvenience that only took a minute to fix?

                        Not after I fixed the issue. 🙂

                        And yes, 8k was a lot. This one was a student network, so he could have been anywhere on campus doing it.

                        The off campus places he was doing it to were small shops and yes he could have been caught. Fortunately for him, he was not.

                        A school is not comparable to a small medical office. Clearly this isn't applicable to the case at hand.

                        dafyreD 1 Reply Last reply Reply Quote 0
                        • dafyreD
                          dafyre @scottalanmiller
                          last edited by

                          @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                          @dafyre said in Concern Around Hackers Using DHCP Pool:

                          @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                          And taking up 8K IPs addresses had no effect but to cause a momentary inconvenience that only took a minute to fix?

                          Not after I fixed the issue. 🙂

                          And yes, 8k was a lot. This one was a student network, so he could have been anywhere on campus doing it.

                          The off campus places he was doing it to were small shops and yes he could have been caught. Fortunately for him, he was not.

                          A school is not comparable to a small medical office. Clearly this isn't applicable to the case at hand.

                          School? No. Small local coffee shop? Maybe. (This was one of the local businesses that I supported)

                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @dafyre
                            last edited by

                            @dafyre said in Concern Around Hackers Using DHCP Pool:

                            @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                            @dafyre said in Concern Around Hackers Using DHCP Pool:

                            @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                            And taking up 8K IPs addresses had no effect but to cause a momentary inconvenience that only took a minute to fix?

                            Not after I fixed the issue. 🙂

                            And yes, 8k was a lot. This one was a student network, so he could have been anywhere on campus doing it.

                            The off campus places he was doing it to were small shops and yes he could have been caught. Fortunately for him, he was not.

                            A school is not comparable to a small medical office. Clearly this isn't applicable to the case at hand.

                            School? No. Small local coffee shop? Maybe. (This was one of the local businesses that I supported)

                            A small local coffee shop had 8K IPs in their DHCP scope? Seriously? It's an off campus student network in a coffee shop?

                            I'm not following this.

                            dafyreD 1 Reply Last reply Reply Quote 0
                            • dafyreD
                              dafyre @scottalanmiller
                              last edited by dafyre

                              @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                              @dafyre said in Concern Around Hackers Using DHCP Pool:

                              @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                              @dafyre said in Concern Around Hackers Using DHCP Pool:

                              @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                              And taking up 8K IPs addresses had no effect but to cause a momentary inconvenience that only took a minute to fix?

                              Not after I fixed the issue. 🙂

                              And yes, 8k was a lot. This one was a student network, so he could have been anywhere on campus doing it.

                              The off campus places he was doing it to were small shops and yes he could have been caught. Fortunately for him, he was not.

                              A school is not comparable to a small medical office. Clearly this isn't applicable to the case at hand.

                              School? No. Small local coffee shop? Maybe. (This was one of the local businesses that I supported)

                              A small local coffee shop had 8K IPs in their DHCP scope? Seriously? It's an off campus student network in a coffee shop?

                              I'm not following this.

                              I had two clients I am speaking of.

                              1. A school with 8k IPs on that subnet (where I was able to mitigate what the student was doing) -- as you said, no longer relevant to the discussion.

                              2. A coffee shop with ~250 IPs on their subnet where I was not able to mitigate what the student was doing (simple Wifi router, lol), and got phone calls a couple of times a week for a while where I reminded them to reboot the AP.

                              scottalanmillerS 1 Reply Last reply Reply Quote 0
                              • stacksofplatesS
                                stacksofplates @scottalanmiller
                                last edited by stacksofplates

                                @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                                Everyone truly believes that customers of a doctor's office will sit in the office, and knowing that they are doing something that will hurt no one and have no useful effect, take the time to try to tie up IP addresses? I'm lost, what motivation do you think people have for this? Why would someone do this? How many of you have seen people do this in the real world?

                                Even if they did, just shut the guest network off then. Essentially one click of the mouse and it's done. I still don't see the point of a whole separate VLAN because if someone does it there you will still have to do the same thing.

                                scottalanmillerS 1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @dafyre
                                  last edited by

                                  @dafyre said in Concern Around Hackers Using DHCP Pool:

                                  I had two clients I am speaking of.

                                  1. A school with 8k IPs on that subnet (where I was able to mitigate what the student was doing) -- as you said, no longer relevant to the discussion.

                                  2. A coffee shop with ~250 IPs on their subnet where I was not able to mitigate what the student was doing (simple Wifi router, lol), and got phone calls a couple of times a week for a while where I reminded them to reboot the AP.

                                  I see. But I'd still say that random people at a coffee shop are not similar to guests in a medical office. It's not socially related. Someone "wanting to mess with some wifi" would target a coffee shop where the wifi is a big deal and part of the business. The guest wifi in a medical office is just a bonus for people, no one is getting medical attention just to sit and use the wifi while waiting.

                                  I'm going to go with "still not applicable", but it is closer at least. But have some empathy for the people in the situation here - absolutely no one is ever (and maybe has never in the history of the Internet) bothered to attack a small medical office in this way.

                                  1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @stacksofplates
                                    last edited by

                                    @stacksofplates said in Concern Around Hackers Using DHCP Pool:

                                    @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                                    Everyone truly believes that customers of a doctor's office will sit in the office, and knowing that they are doing something that will hurt no one and have no useful effect, take the time to try to tie up IP addresses? I'm lost, what motivation do you think people have for this? Why would someone do this? How many of you have seen people do this in the real world?

                                    Even if they did, just shit the guest network off then. Essentially one click of the mouse and it's done. I still don't see the point of a whole separate VLAN because if someone does it there you will still have to do the same thing.

                                    Yeah, separating them still leaves both networks open for attack. If someone attacks the guest network, you have to deal with that the same. And if something goes wrong or an internal user attacks the main network, that's still got the problem. I don't see any real risk mitigation, just time being spent to make things more complex.

                                    stacksofplatesS 1 Reply Last reply Reply Quote 0
                                    • stacksofplatesS
                                      stacksofplates @scottalanmiller
                                      last edited by

                                      @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                                      @stacksofplates said in Concern Around Hackers Using DHCP Pool:

                                      @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                                      Everyone truly believes that customers of a doctor's office will sit in the office, and knowing that they are doing something that will hurt no one and have no useful effect, take the time to try to tie up IP addresses? I'm lost, what motivation do you think people have for this? Why would someone do this? How many of you have seen people do this in the real world?

                                      Even if they did, just shit the guest network off then. Essentially one click of the mouse and it's done. I still don't see the point of a whole separate VLAN because if someone does it there you will still have to do the same thing.

                                      Yeah, separating them still leaves both networks open for attack. If someone attacks the guest network, you have to deal with that the same. And if something goes wrong or an internal user attacks the main network, that's still got the problem. I don't see any real risk mitigation, just time being spent to make things more complex.

                                      Interesting typo I made there

                                      1 Reply Last reply Reply Quote 0
                                      • travisdh1T
                                        travisdh1 @scottalanmiller
                                        last edited by

                                        @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                                        @Dashrender said in Unifi switch - tagged traffic issues:

                                        @Mike-Davis said in Unifi switch - tagged traffic issues:

                                        I think were @Dashrender is going is that if you use the Unifi guest service and it's using your production DHCP and DNS servers, and then those devices get hacked, they can take down your production DNS/DHCP servers. If they are on their own VLAN and using their own DHCP/DNS servers, yuo are mitigating some of that threat.

                                        This exactly - and just to clarify a tiny bit - the bits getting hacked are the IOT/guest network devices, not DHCP/DNS.

                                        You think that your guests in the office are attacking your DNS and DHCP services? And you feel that your DNS and DHCP are that fragile to be a concern to that degree?

                                        It's been proven to happen, yes. This is exactly what hit that university.

                                        scottalanmillerS 1 Reply Last reply Reply Quote 1
                                        • scottalanmillerS
                                          scottalanmiller @travisdh1
                                          last edited by

                                          @travisdh1 said in Concern Around Hackers Using DHCP Pool:

                                          @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                                          @Dashrender said in Unifi switch - tagged traffic issues:

                                          @Mike-Davis said in Unifi switch - tagged traffic issues:

                                          I think were @Dashrender is going is that if you use the Unifi guest service and it's using your production DHCP and DNS servers, and then those devices get hacked, they can take down your production DNS/DHCP servers. If they are on their own VLAN and using their own DHCP/DNS servers, yuo are mitigating some of that threat.

                                          This exactly - and just to clarify a tiny bit - the bits getting hacked are the IOT/guest network devices, not DHCP/DNS.

                                          You think that your guests in the office are attacking your DNS and DHCP services? And you feel that your DNS and DHCP are that fragile to be a concern to that degree?

                                          It's been proven to happen, yes. This is exactly what hit that university.

                                          You're making my point. Clearly there is no threat, at all, to a medical office.

                                          dafyreD 1 Reply Last reply Reply Quote 0
                                          • dafyreD
                                            dafyre @scottalanmiller
                                            last edited by

                                            @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                                            @travisdh1 said in Concern Around Hackers Using DHCP Pool:

                                            @scottalanmiller said in Concern Around Hackers Using DHCP Pool:

                                            @Dashrender said in Unifi switch - tagged traffic issues:

                                            @Mike-Davis said in Unifi switch - tagged traffic issues:

                                            I think were @Dashrender is going is that if you use the Unifi guest service and it's using your production DHCP and DNS servers, and then those devices get hacked, they can take down your production DNS/DHCP servers. If they are on their own VLAN and using their own DHCP/DNS servers, yuo are mitigating some of that threat.

                                            This exactly - and just to clarify a tiny bit - the bits getting hacked are the IOT/guest network devices, not DHCP/DNS.

                                            You think that your guests in the office are attacking your DNS and DHCP services? And you feel that your DNS and DHCP are that fragile to be a concern to that degree?

                                            It's been proven to happen, yes. This is exactly what hit that university.

                                            You're making my point. Clearly there is no threat, at all, to a medical office.

                                            Unless they use insecure IOT thingies.

                                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 2 / 3
                                            • First post
                                              Last post