logo svg
logo

January 1, 2026

What Is DHCP Starvation? How IP Exhaustion Attacks Work

Understanding DHCP starvation attacks, their risks, and how to prevent IP pool exhaustion and rogue DHCP abuse.

Mohammed Khalil

Mohammed Khalil

Featured Image

DHCP Starvation is a form of denial of service attack against the Dynamic Host Configuration Protocol DHCP service. In a DHCP starvation attack, a malicious actor floods the DHCP server with a large number of DHCP requests e.g. DISCOVER messages using spoofed MAC addresses, with the goal of consuming all available IP addresses in the server’s pool. By exhausting the DHCP address pool, the attacker prevents legitimate clients from obtaining an IP configuration, effectively knocking them off the network; no IP means no network connectivity. This attack is most commonly seen in on premises networks, office LANs, campus networks, Wi Fi hotspots where DHCP is used to auto configure clients.

Why does DHCP starvation matter today? Despite being a well known attack, many networks remain vulnerable if they haven’t implemented basic protective features. A successful DHCP starvation incident can disrupt business operations by causing widespread connectivity failure. More insidiously, attackers often use starvation as a precursor to more damaging exploits for example, launching a rogue DHCP server to hand out malicious network settings like a fake gateway or DNS once the real DHCP server is starved. This one two punch can lead to man in the middle attacks on the network, enabling attackers to intercept traffic or steal credentials. In essence, DHCP starvation turns a fundamental network service into an attack vector. It’s primarily a concern in traditional enterprise networks; fully cloud native environments are largely immune, since public cloud VPCs use isolated, provider managed IP assignment where tenants cannot flood each other’s DHCP services. However, any organization running DHCP in their own infrastructure including private clouds or virtualized data centers needs to be aware of this threat.

How DHCP Starvation Works

DHCP starvation exploits the open, trust based nature of the DHCP protocol. By design, DHCP servers will respond to any client’s request for an IP lease on the local network. Here’s how the attack unfolds step by step:

  1. Attacker Sends Rogue DHCP Requests: The attacker connects a device to the target network e.g. a laptop or a small computer on an open ethernet port or Wi Fi and begins blasting DHCP requests. Often, the attack uses DHCP DISCOVER messages, which are what normal clients send to find a DHCP server. Each malicious request is crafted with a spoofed MAC address and often a random Transaction ID so that the DHCP server sees each as a unique client. The attacker can use readily available tools such as Yersinia or custom scripts to automate sending hundreds or thousands of these requests quickly.
  2. DHCP Server Exhausts its IP Pool: The DHCP server dutifully responds to each fake client. For each request, it reserves an IP address from its pool and issues a DHCPOFFER. Even if the attacker doesn’t complete the full DHCP handshake for every offer, those IPs become temporarily reserved. With enough fake requests, the server’s entire pool of IP addresses gets allocated to phantom clients. In effect, the DHCP server has no free IP addresses left to hand out. Some attackers may also programmatically complete the DHCP handshake sending a REQUEST and receiving an ACK for each offered address, which locks each lease in for the full lease duration, making the exhaustion last longer. In either case, the result is the same: the DHCP server’s address scope is fully occupied by the attacker’s fake clients.
  3. Legitimate Clients Are Denied IP Configuration: Once the pool is exhausted, any new or rebooting legitimate client on the network will request DHCP and receive no IP. The DHCP server will typically either ignore new requests or send a DHCPNAK indicating no addresses are available. From the user perspective, they cannot join the network, an effective local denial of service condition. Their device might show an autoconfiguration APIPA address or no network access. This is why DHCP starvation is fundamentally a denial of service attack ; it doesn't damage systems, but it makes the network unusable for others.
  4. Often Attacker Introduces a Rogue DHCP Server: DHCP starvation is frequently Stage 1 of a compound attack. Once the legitimate DHCP server is out of the picture starved of addresses, the attacker can activate their own DHCP server on the network, a laptop or rogue device running DHCP service. Using tools or even features in frameworks like Metasploit, the attacker’s rogue DHCP will respond to clients’ DHCP requests with seemingly valid IP leases. Because of the first come, first serve nature of DHCP, the rogue server can win the race and supply IP configurations while the legitimate server is incapacitated. The rogue DHCP will deliberately give out malicious network settings for example, setting the default gateway and DNS server to the attacker’s own machine. Now the attacker has effectively inserted themselves as a man in the middle of the network. Every new client that comes online will get an IP from the rogue server and unknowingly send their traffic through the attacker.
  5. Maintaining the Starvation: For the attack to persist, the attacker may need to continue sending some DHCP traffic. If the leases were only reserved via unanswered offers, the attacker will keep broadcasting fake requests periodically to maintain the exhaustion as earlier offers time out. If the leases were fully completed, the pool will remain exhausted until those leases expire which could be hours by default, or longer if configured so. During this window, the rogue DHCP server remains the main source of IP assignments in the network.

In summary, the mechanism relies on volume and deception volume of DHCP requests to overwhelm the server, and deception by using fake hardware addresses to appear as many clients. The DHCP server lacks authentication or client verification, so it simply trusts these requests. Without additional network safeguards, the server can’t distinguish a legitimate client from a spoofed one. This makes DHCP starvation an unfortunately straightforward attack to execute with the right access to the network.

Real World Examples

Attack Scenario: Imagine an internal employee or intruder plugging a device into an open network port inside a corporate office. The network uses DHCP to configure employee laptops. The attacker runs a tool like Yersinia or a Python script to launch a DHCP starvation attack. Within minutes, the IT helpdesk starts getting calls: multiple users report Unable to get IP address or Network is down. The attacker’s machine has flooded the DHCP server, and now no one can join the network. Taking it a step further, the attacker starts a rogue DHCP service on their device. Now, as soon as a user disconnects and reconnects or a new device comes on, the rogue server responds first with an IP offer. Unaware, the user’s machine accepts the lease. The IP might be in a valid range, but the DNS server and gateway are set to the attacker’s IP. As a result, all the victim’s traffic is quietly funnelled through the attacker. This enables full man in the middle interception the attacker can see or modify unencrypted data. Pentera Labs, for example, demonstrated this attack chain: starving the real DHCP server, then answering the victim’s DHCP request with a malicious offer and hijacking the victim’s DNS queries. In their demo, the attacker Pentera tool was able to force the victim to authenticate to a fake service, capturing an NTLM password hash, a clear illustration of how a simple DHCP exploit can escalate to credential theft.

Penetration Testing Use: Red team and penetration testers often use DHCP starvation in controlled environments to audit network resiliency. It’s an easy test of whether the target network has basic protections. For instance, a tester on a client’s guest Wi Fi may run a starvation attack; if the Wi Fi and switching infrastructure are properly configured, the attack should fail or be quickly detected. If it succeeds, the tester can then proceed to set up a rogue DHCP and demonstrate a potential man in the middle attack risk. The tool Yersinia popular in Kali Linux is commonly used to automate DHCP starvation during pentests. This tool can send continuous DHCPDISCOVER floods and has options to manage the speed of the attack. There have been cases where even small scale networks like a home lab or a conference network were inadvertently taken down by an experimenter running a DHCP flood underscoring that any DHCP server without defenses can be affected, whether it’s a big enterprise or a simple router.

Limits in Cloud Environments: In public cloud networks AWS, Azure, GCP, you typically will not see DHCP starvation attacks. Cloud VPCs provide IPs to VMs via cloud managed DHCP services, but tenants cannot spam the DHCP of other tenants. Each instance usually gets an IP from a pre-set pool controlled by the cloud; an attacker in one VM cannot cause the cloud’s entire IP pool to exhaust. Also, cloud networks enforce hypervisor level controls e.g., anti spoofing filters that prevent VMs from faking MAC addresses arbitrarily. Thus, the classic DHCP starvation is not applicable as an attack between cloud tenants. The concept might only apply within a single tenant’s environment e.g., an attacker compromises one VM and tries to starve DHCP for other VMs in the same virtual network, but even that is rare and constrained. The primary real world domain of DHCP starvation remains traditional on premises networks, or possibly private cloud setups that resemble on prem networks in how DHCP is provided.

Why DHCP Starvation Is Important

DHCP starvation is important to understand because it targets a foundational service that many organizations take for granted. If DHCP goes down or is subverted, an entire network segment can effectively collapse. Unlike some exotic exploits, this attack doesn’t require advanced malware or zero day vulnerabilities; it abuses normal DHCP operation. Here are key implications and why it’s significant:

In summary, DHCP starvation is important because it targets the very mechanism that lets devices talk on the network. It exemplifies how an attack on infrastructure, not just on endpoints or software, can have wide reaching consequences. For defenders, it highlights the need for vigilant network level security and the principle of least trust even for internal services.

Common Abuse or Misuse

DHCP starvation is inherently an abusive technique; there's no legitimate reason for a user to send massive DHCP requests. Attackers leverage this method because it’s effective and relatively hard for the DHCP server alone to distinguish from normal operations. Here’s how and why attackers abuse it:

In essence, attackers abuse DHCP starvation because it’s a simple, potent weapon against network availability and can serve as a launching pad for deeper compromise. Its effectiveness lies in exploiting a fundamental protocol weakness: lack of identity verification in DHCP and the often unprepared state of network defenses.

Detection & Monitoring

Detecting a DHCP starvation attack in progress requires visibility into DHCP traffic and the status of IP address pools. Security teams and network admins should monitor for anomalies in DHCP activity that could indicate a starvation attempt or a rogue DHCP server. Here are some key detection strategies and telemetry sources:

In practice, effective detection often comes down to instrumentation to ensure your network infrastructure is logging relevant info and your SOC is aggregating those logs. A combination of DHCP server telemetry, switch/security device alerts, and network traffic analysis provides the best coverage. Remember that a well executed attack may try to fly under the radar by not outright crashing the network, so subtle signs like a trickle of weird DHCP traffic should be taken seriously. Having network segmentation in place can also limit the scope of what you need to monitor at once, simplifying detection domain by domain.

Mitigation & Prevention

Defending against DHCP starvation is fortunately straightforward with the right network features enabled. The goal is to harden the network’s DHCP infrastructure such that a single client or malicious device cannot monopolize IP addresses and cannot impersonate a DHCP server. Key mitigations include:

Crucially, treat these measures as standard network hygiene, not optional add ons. Features like DHCP snooping and port security are widely available and should be part of any enterprise switch configuration baseline. They don’t generally require additional hardware; it's about enabling and configuring what you likely already have. When properly implemented, these controls make DHCP starvation attacks impractical, forcing attackers to look for other, more difficult avenues. As a bonus, they also help against other network attacks, rogue servers, ARP spoofing, etc., strengthening overall network resilience.

Related Concepts

DHCP starvation connects to several other security concepts and attack techniques in networking:

Understanding these related concepts helps in building a holistic defense strategy. You don’t want to fix DHCP starvation but ignore ARP poisoning, for example, since an attacker could just switch methods. Similarly, ensuring high availability of DHCP to mitigate accidental failures is good, but you also need security measures for malicious scenarios. All these pieces DHCP security, ARP security, network segmentation, and NAC work together as layers of defense in a well architected network.

FAQs

Signs include: a sudden inability for clients to obtain IP addresses many users getting APIPA 169.254.x.x addresses or seeing DHCP server unreachable errors, DHCP server logs indicating the scope is full or lots of discover/offer activity, or monitoring tools/IDS alerts about a flood of DHCP requests. Using a packet sniffer on an affected subnet will show a barrage of DHCP broadcast requests. You may also observe multiple DHCP leases tied to unusual or randomized MAC addresses in the server’s lease table. If a rogue DHCP server is present, you might see unexpected IP configurations on clients like the wrong default gateway or DNS. Monitoring systems specifically looking for DHCP exhaustion or rogue offers like SIEM rules or DHCP snooping logs provide the quickest confirmation.

It can definitely happen over Wi Fi if the attacker is connected to the wireless network. The Wi Fi access point acts as a bridge, so an attacker on Wi Fi can flood the wired DHCP server just like a wired client could. Many public or enterprise Wi Fi networks are vulnerable unless they have protections. However, some wireless infrastructure includes features to mitigate this e.g., rate limiting DHCP from each client, or client isolation that doesn’t directly stop starvation but can limit other effects. Also, if the Wi Fi uses enterprise security like 802.1X, it’s harder for an unauthorized person to join and launch such attacks. But in any open or poorly secured Wi Fi, an attacker connected as a client can perform DHCP starvation on that network’s DHCP server.

In public clouds, the networking is virtualized and isolated per tenant. Each cloud instance typically gets an IP via the cloud’s internal DHCP or metadata service, but as a customer you can’t send raw DHCP packets to other tenants or the underlying infrastructure. Cloud providers often use distributed IP management that isn’t subject to exhaustion by one user. Also, MAC spoofing is usually disallowed cloud virtual switches will filter traffic that doesn’t match the VM’s assigned MAC, preventing the classic method of starvation. Essentially, the cloud’s network hypervisor won’t let a VM behave like a rogue DHCP client or server beyond its own virtual network. Even within your own cloud VPC, the addressing is under your control; an attacker in one of your VMs could at best starve the DHCP for that VPC which they’re already in, but they’d gain little since they already control that environment to launch the attack. Thus, DHCP starvation is primarily a layer 2 attack in traditional networks and not effective across the virtualized, security hardened layers of public clouds.

DHCP starvation is about exhausting the IP pool of a DHCP server through a flood of fake requests; it's a denial of service tactic. DHCP spoofing rogue DHCP is about introducing a fake DHCP server to the network to provide malicious configurations like wrong gateway/DNS to clients. They often go hand in hand: attackers first do starvation to knock out the real server, then do spoofing to actively mislead clients. However, they can occur separately. For instance, an attacker might plug in a rogue DHCP server on a network that has no protection; if it’s faster than the real server, some clients might take its leases even without starvation. Conversely, an attacker could starve DHCP just to cause a DoS outage without setting up a rogue server. In summary, starvation = making the real DHCP unavailable; spoofing = setting up a fake DHCP. Both are mitigated by similar network defenses DHCP snooping trusts, etc..

There are multiple tools and scripts. Common ones include Yersinia, which is a network attack toolkit that has a DHCP starvation mode that automates sending DHCPDISCOVER packets continuously. Another is DHCPig, part of the Kali Linux toolkit which is specifically designed for DHCP exhaustion. Metasploit has a module for setting up a rogue DHCP server useful after starvation. Attackers can also write simple scripts using scrappy Python libraries to craft custom DHCP packets and flood them. On the defensive side, tools like Wireshark, Suricata IDS, or even Windows Performance Monitor can be used to detect or analyze these attacks. But the barrier to launching the attack is low even if a short custom program can do it, as evidenced by community scripts on GitHub or even one liners with traffic generator tools. Thus, the focus should be on prevention, because technically stopping the flood with reactive measures can be difficult once it’s underway.

Using static IPs for critical devices servers, printers, etc. means those particular devices don’t rely on DHCP, so they won’t be directly affected if the DHCP server is under attack. This can be a partial mitigation for the impact e.g., your servers won’t drop offline due to no DHCP. However, it doesn’t prevent the attack itself or protect client devices that do use DHCP. Also, static IP deployment at scale is not practical for all devices hence we use DHCP in the first place. Static addressing is more of a resilience tactic for a subset of devices. To actually protect the network from the attack, you need to implement the network security measures discussed snooping, port security, etc.. Additionally, even with static IPs, a rogue DHCP could still send spoofed configurations that might confuse some clients or show up in logs. So static IPs are not a security control against starvation, they’re just an operational choice that could limit the damage in some scenarios.

IPv6 changes the game a bit. Many IPv6 networks use SLAAC Stateless Address Auto Config where clients auto generate addresses, so there’s no central pool to exhaust in that case. You can’t starve SLAAC because the address space 64 bits for the host part is practically infinite for a subnet. IPv6 also has DHCPv6 stateful, but an attacker would have to send a huge number of DHCPv6 requests to even dent the pool, and even then the available address space is enormously larger; a typical IPv6 subnet has 2^64 addresses. That said, conceptually an attacker could cause mischief by sending many DHCPv6 requests to consume server resources or using other tricks. But IPv6 has its own set of attacks for example, rather than starvation, an attacker might send rogue Router Advertisements to cause IPv6 clients to pick wrong gateways; that's a different but related MITM tactic in IPv6. In practice, DHCP starvation is mainly a worry for IPv4. Network admins should focus on IPv6 specific mitigations RA Guard, DHCPv6 guard for analogous protections. In short, IPv6 addressing design makes the classic starvation attack unlikely to be effective, but always secure your IPv6 just the same, since new attack variants could emerge.

DHCP starvation is a powerful reminder that even the basic plumbing of networks can be turned against us if not properly secured. By flooding a DHCP server with fake requests, an attacker can deny IP addresses to legitimate devices and potentially seize the role of DHCP server to manipulate network traffic. The attack itself is not complex; it leverages the openness of DHCP but its impacts can be severe, ranging from network outages to silent man in the middle espionage.

The good news is that defending against DHCP starvation is very feasible with strong network architecture practices. Implementing features like DHCP snooping, port security, and proper network segmentation essentially immunize a network against this threat. These are not exotic countermeasures, but rather fundamental security steps that any enterprise network should have in place as part of its design. As we’ve discussed, such measures will not only stop DHCP starvation but also improve overall network integrity against related attacks.

In closing, what is DHCP starvation? It’s both a denial of service technique and a stepping stone for deeper attacks. From a defender’s view, it underscores the importance of never trusting by default even in internal networks. Every network protocol that assumes cooperative behavior like DHCP can be abused, and it’s our job as security engineers to add the necessary checks and balances. By understanding how DHCP starvation works and deploying the right preventive controls, organizations can ensure that IP address management remains a service for users not a weapon for attackers.

About the Author

Mohammed Khalil is a Cybersecurity Architect at DeepStrike, specializing in advanced penetration testing and offensive security operations. With certifications including CISSP, OSCP, and OSWE, he has led numerous red team engagements for Fortune 500 companies, focusing on cloud security, application vulnerabilities, and adversary emulation. His work involves dissecting complex attack chains and developing resilient defense strategies for clients in the finance, healthcare, and technology sectors.

background
Let's hack you before real hackers do

Stay secure with DeepStrike penetration testing services. Reach out for a quote or customized technical proposal today

Contact Us