DHCP and DNS are both core networking protocols. 

Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway.
— https://technet.microsoft.com/en-us/library/dd145320(v=ws.10).aspx
An often-used analogy to explain the Domain Name System is that it serves as the phone book for the Internet by translating human-friendly computer hostnames into IP addresses. For example, the domain name www.example.com translates to the addresses (IPv4) and 2606:2800:220:6d:26bf:1447:1097:aa7 (IPv6). Unlike a phone book, DNS can be quickly updated, allowing a service’s location on the network to change without affecting the end users, who continue to use the same host name.
— https://en.wikipedia.org/wiki/Domain_Name_System

In lab ten, I explore security exploits in the DHCP and DNS protocols. The idea is to save a copy of the target website, modify it and to use DualServer to spin up an instance of a server to look like we're the server of origin. In this lab, I did not manage to meet a result a was happy with, and I can only assume the lab wanted me to see the amended version of the site. 

End of lab review

I am confused. The lab hints for me to be able to see the amended version, but does not explicitly tell me what the expected outcome is supposed to be. Apart from chatting with other students, I've gone ahead and posted on the forums to see what experiences other people have wit this lab.  http://ecampus.nmit.ac.nz/moodle/mod/forum/view.php?f=29198