From 887da7bdff5fe681c389b7d2aeb4edd8839e79d4 Mon Sep 17 00:00:00 2001 From: duxv <60303111+duxv@users.noreply.github.com> Date: Wed, 3 Dec 2025 15:19:02 +0200 Subject: [PATCH] spell check --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index c721464..ec2c911 100644 --- a/README.md +++ b/README.md @@ -550,7 +550,7 @@ On Cisco Switches: **Description:** The Ipv6 client sends a *Solicit* message to the All_DHCP_Relay_Agents_and_Servers address to find available DHCP servers. Any server that can meet the client's requirements responds with an *Advertise* message. The client then chooses one of the servers and sends a *Request* message to the server asking for confirmed assignment of addresses and other configuration information.The server responds with a *Reply* message that contains the confirmed addresses and configuration. -This schema looks simular to DHCPv4 so the main goal for the attacker is to use fake DHCPv6 server to redirect victims traffic to himself. +This schema looks similar to DHCPv4 so the main goal for the attacker is to use fake DHCPv6 server to redirect victims traffic to himself. The attacker can catch client DHCP solicit message and can actually reply, pretending that he is the DHCPv6 server and assign credentials (such as the DNS address) to be used by victim.