Username: 
Password: 
Restrict session to IP 

MemcacheD amplification attack

Global Rank: 228
Totalscore: 94499
Posts: 1693
Thanks: 1365
UpVotes: 929
Registered: 17y 5d




Last Seen: 5d 19h
The User is Offline
MemcacheD amplification attack
Google/translate2Thank You!1Good Post!0Bad Post! link
Someone on overthewire irc mentioned this commit being blamed for current DoS attacks

https://github.com/memcached/memcached/commit/2439472aae5960b9b2f8ef93f3f62047a28700f2

And fixed with

https://github.com/memcached/memcached/commit/dbb7a8af90054bf4ef51f5814ef7ceb17d83d974


As you should have thought, this kinda issue could be only triggered by UDP, as you cannot fake your TCP/IP address.
The geeks shall inherit the properties and methods of object earth.
Global Rank: 1
Totalscore: 758681
Posts: 437
Thanks: 497
UpVotes: 470
Registered: 15y 209d












The User is Offline
RE: MemcacheD amplification attack
Google/translate0Thank You!0Good Post!0Bad Post! link
I tried to access Context but I got a null-pointer exception. What DoS attacks? On OTW? WeChall? Are we under attack? *runs around screaming*

Also, you can easily spoof your TCP/IP address, it's just a bit harder to set up an actual session with it... ;)
Global Rank: 228
Totalscore: 94499
Posts: 1693
Thanks: 1365
UpVotes: 929
Registered: 17y 5d




Last Seen: 5d 19h
The User is Offline
RE: MemcacheD amplification attack
Google/translate0Thank You!0Good Post!0Bad Post! link
MemcacheD attacks were in the news.
I thought it might be of interest. Smile
The geeks shall inherit the properties and methods of object earth.
tunelko, quangntenemy, TheHiveMind, Z, balicocat, Ge0, samuraiblanco, arraez, jcquinterov, hophuocthinh, alfamen2, burhanudinn123, Ben_Dover, stephanduran89, braddie0, SwolloW, dangarbri, csuquvq have subscribed to this thread and receive emails on new posts.
1 people are watching the thread at the moment.
This thread has been viewed 12711 times.