The Yo-Yo Attack: Bankrupting Cloud Infrastructure
A comprehensive guide to the Yo-Yo attack, an Economic Denial of Sustainability (EDoS) technique that targets auto-scaling mechanisms in cloud environments.
Feb 28, 2026Cybersecurity
Dynamic Host Configuration Protocol (DHCP) is one of the foundational services in computer networking. It automatically assigns IP addresses and other network configuration parameters (such as DNS servers and default gateways) to devices, enabling them to communicate without manual setup.
But while DHCP makes network management easier, it also introduces potential security risks. Let's explore how it works, the red team (attacker) perspective, and the blue team (defender) strategies to secure it.
When a device connects to a network, it follows the DORA process:
This automated system reduces configuration overhead but can be abused if not properly secured.
Attackers can exploit DHCP in several ways:
An attacker can set up a fake DHCP server on the network. When clients request an IP, the rogue server responds faster than the legitimate server, providing malicious configuration (e.g., a fake gateway for MITM attacks).
Example: Using dhcpd to configure a rogue DHCP server
# Install DHCP server (Linux example)
sudo apt install isc-dhcp-server
# Configure rogue DHCP server (/etc/dhcp/dhcpd.conf)
subnet 192.168.1.0 netmask 255.255.255.0 {
range 192.168.1.100 192.168.1.200;
option routers 192.168.1.50; # Attacker-controlled gateway
option domain-name-servers 8.8.8.8, 8.8.4.4;
}An attacker floods the DHCP server with fake requests, exhausting its pool of IP addresses, preventing legitimate clients from connecting.
Example: DHCP starvation using yersinia
sudo yersinia -I
# Select DHCP and launch starvation attackDefenders must ensure DHCP is both available and trusted.
Enable DHCP Snooping on switches to allow only trusted ports to respond to DHCP requests.
Cisco Example:
Switch(config)# ip dhcp snooping
Switch(config)# ip dhcp snooping vlan 10
Switch(config)# interface GigabitEthernet0/1
Switch(config-if)# ip dhcp snooping trustWhen combined with DHCP Snooping, it blocks packets from hosts using unauthorized IPs.
Switch(config)# interface GigabitEthernet0/2
Switch(config-if)# ip verify sourceExample Suricata rule to detect rogue DHCP offers:
alert udp any 67 -> any 68 (msg:"Suspicious DHCP Offer Detected"; sid:100001;)DHCP is critical for network operations, but it's also a prime target for attackers.
By understanding both perspectives, organizations can balance functionality with security.
Love it? Share this article: