Username: 
Password: 
Restrict session to IP 

MemcacheD amplification attack

Global Rank: 234
Totalscore: 84910
Posts: 1356
Thanks: 1202
UpVotes: 719
Registered: 12y 46d




Last Seen: 11d 22h
The User is Offline
MemcacheD amplification attack
Google/translate2Thank You!1Good Post!0Bad Post! link
Someone on overthewire irc mentioned this commit being blamed for current DoS attacks

https://github.com/memcached/memcached/commit/2439472aae5960b9b2f8ef93f3f62047a28700f2

And fixed with

https://github.com/memcached/memcached/commit/dbb7a8af90054bf4ef51f5814ef7ceb17d83d974


As you should have thought, this kinda issue could be only triggered by UDP, as you cannot fake your TCP/IP address.
The geeks shall inherit the properties and methods of object earth.
Global Rank: 1
Totalscore: 754074
Posts: 400
Thanks: 438
UpVotes: 386
Registered: 10y 249d












The User is Offline
RE: MemcacheD amplification attack
Google/translate0Thank You!0Good Post!0Bad Post! link
I tried to access Context but I got a null-pointer exception. What DoS attacks? On OTW? WeChall? Are we under attack? *runs around screaming*

Also, you can easily spoof your TCP/IP address, it's just a bit harder to set up an actual session with it... ;)
Global Rank: 234
Totalscore: 84910
Posts: 1356
Thanks: 1202
UpVotes: 719
Registered: 12y 46d




Last Seen: 11d 22h
The User is Offline
RE: MemcacheD amplification attack
Google/translate0Thank You!0Good Post!0Bad Post! link
MemcacheD attacks were in the news.
I thought it might be of interest. Smile
The geeks shall inherit the properties and methods of object earth.
tunelko, TheHiveMind, Z, Ge0, samuraiblanco, arraez, jcquinterov, hophuocthinh, alfamen2, burhanudinn123, Ben_Dover, stephanduran89, braddie0 have subscribed to this thread and receive emails on new posts.
1 people are watching the thread at the moment.
This thread has been viewed 1828 times.