Service:
bootp
Protocol:
UDPPort:
68Used for:
Dynamic host configuration and bootstrappingWhy It’s Open
Port 68 is used by BOOTP (Bootstrap Protocol) and DHCP (Dynamic Host Configuration Protocol) clients. This UDP port receives network configuration information including IP addresses, subnet masks, gateways, and DNS servers. Systems with this port open are typically DHCP clients requesting or maintaining network configuration.
Common Risks
- DHCP spoofing attacks
Malicious DHCP servers can provide incorrect network configuration - Man-in-the-middle setup
Rogue DHCP can redirect traffic through attacker systems - DNS poisoning
Malicious DNS servers distributed via DHCP responses - Network reconnaissance
DHCP responses reveal network topology and services - DHCP starvation
Exhausting DHCP pool to cause denial of service - Rogue gateway attacks
Directing traffic through malicious routing systems - Information disclosure
DHCP options may leak sensitive network information
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Enumeration & Testing
DHCP Client Detection:
nmap -sU -p 68DHCP Discovery Test:
nmap --script dhcp-discover -e eth0Manual DHCP Request:
dhclient -v eth0DHCP Packet Analysis:
tcpdump -i eth0 -n port 67 or port 68Rogue DHCP Detection:
nmap --script broadcast-dhcp-discoverWhat to Look For
| Checkpoint | What it means |
|---|---|
| DHCP server responses | Multiple DHCP servers may indicate rogue services |
| Network configuration offered | IP ranges, gateways, and DNS servers provided |
| DHCP options | Additional configuration parameters and vendor info |
| Lease duration | How long IP addresses are assigned |
| Suspicious responses | Unusual gateways or DNS servers that may be malicious |
Mitigation
- Keep software updated
Apply latest security patches - Strong authentication
Use complex passwords and 2FA - Access restrictions
Limit service to trusted networks - Monitor activity
Log and review service usage - Disable if unused
Remove unnecessary services
TL;DR
- Port 68 = DHCP/BOOTP client port
- Network configuration protocol critical for system connectivity
- Vulnerable to spoofing and man-in-the-middle attacks
- Monitor for rogue DHCP servers on network segments
Known CVEs and Exploits
- CVE-2018-1111 – DHCP client command injection vulnerability (DHCPwn)
- CVE-2011-0997 – DHCP client buffer overflow vulnerability
- CVE-2020-27748 – ISC DHCP buffer overflow vulnerability
- DHCP starvation attacks – Exhaustion of DHCP address pools to cause denial of service