Username: 
Password: 
Restrict session to IP 

MemcacheD amplification attack

Global Rank: 243
Totalscore: 89476
Posts: 1675
Thanks: 1356
UpVotes: 913
Registered: 16y 272d




Last Seen: 1s
The User is Online
MemcacheD amplification attack
Google/translate2Thank You!1Good Post!0Bad Post! link
Someone on overthewire irc mentioned this commit being blamed for current DoS attacks

https://github.com/memcached/memcached/commit/2439472aae5960b9b2f8ef93f3f62047a28700f2

And fixed with

https://github.com/memcached/memcached/commit/dbb7a8af90054bf4ef51f5814ef7ceb17d83d974


As you should have thought, this kinda issue could be only triggered by UDP, as you cannot fake your TCP/IP address.
The geeks shall inherit the properties and methods of object earth.
Global Rank: 1
Totalscore: 759084
Posts: 437
Thanks: 496
UpVotes: 469
Registered: 15y 110d












The User is Offline
RE: MemcacheD amplification attack
Google/translate0Thank You!0Good Post!0Bad Post! link
I tried to access Context but I got a null-pointer exception. What DoS attacks? On OTW? WeChall? Are we under attack? *runs around screaming*

Also, you can easily spoof your TCP/IP address, it's just a bit harder to set up an actual session with it... ;)
Global Rank: 243
Totalscore: 89476
Posts: 1675
Thanks: 1356
UpVotes: 913
Registered: 16y 272d




Last Seen: 2s
The User is Online
RE: MemcacheD amplification attack
Google/translate0Thank You!0Good Post!0Bad Post! link
MemcacheD attacks were in the news.
I thought it might be of interest. Smile
The geeks shall inherit the properties and methods of object earth.
tunelko, quangntenemy, TheHiveMind, Z, balicocat, Ge0, samuraiblanco, arraez, jcquinterov, hophuocthinh, alfamen2, burhanudinn123, Ben_Dover, stephanduran89, braddie0, SwolloW, dangarbri have subscribed to this thread and receive emails on new posts.
1 people are watching the thread at the moment.
This thread has been viewed 12640 times.