Username: 
Password: 
Restrict session to IP 

MemcacheD amplification attack

Global Rank: 252
Totalscore: 87267
Posts: 1635
Thanks: 1336
UpVotes: 885
Registered: 16y 42d




Last Seen: 53m 15s
The User is Offline
MemcacheD amplification attack
Google/translate2Thank You!1Good Post!0Bad Post! link
Someone on overthewire irc mentioned this commit being blamed for current DoS attacks

https://github.com/memcached/memcached/commit/2439472aae5960b9b2f8ef93f3f62047a28700f2

And fixed with

https://github.com/memcached/memcached/commit/dbb7a8af90054bf4ef51f5814ef7ceb17d83d974


As you should have thought, this kinda issue could be only triggered by UDP, as you cannot fake your TCP/IP address.
The geeks shall inherit the properties and methods of object earth.
Global Rank: 1
Totalscore: 760035
Posts: 431
Thanks: 491
UpVotes: 456
Registered: 14y 246d












The User is Offline
RE: MemcacheD amplification attack
Google/translate0Thank You!0Good Post!0Bad Post! link
I tried to access Context but I got a null-pointer exception. What DoS attacks? On OTW? WeChall? Are we under attack? *runs around screaming*

Also, you can easily spoof your TCP/IP address, it's just a bit harder to set up an actual session with it... ;)
Global Rank: 252
Totalscore: 87267
Posts: 1635
Thanks: 1336
UpVotes: 885
Registered: 16y 42d




Last Seen: 53m 15s
The User is Offline
RE: MemcacheD amplification attack
Google/translate0Thank You!0Good Post!0Bad Post! link
MemcacheD attacks were in the news.
I thought it might be of interest. Smile
The geeks shall inherit the properties and methods of object earth.
tunelko, quangntenemy, TheHiveMind, Z, balicocat, Ge0, samuraiblanco, arraez, jcquinterov, hophuocthinh, alfamen2, burhanudinn123, Ben_Dover, stephanduran89, braddie0, SwolloW, dangarbri have subscribed to this thread and receive emails on new posts.
1 people are watching the thread at the moment.
This thread has been viewed 12429 times.