Username: 
Password: 
Restrict session to IP 

MemcacheD amplification attack

Global Rank: 248
Totalscore: 87961
Posts: 1662
Thanks: 1350
UpVotes: 906
Registered: 16y 225d




Last Seen: 7h 58m
The User is Offline
MemcacheD amplification attack
Google/translate2Thank You!1Good Post!0Bad Post! link
Someone on overthewire irc mentioned this commit being blamed for current DoS attacks

https://github.com/memcached/memcached/commit/2439472aae5960b9b2f8ef93f3f62047a28700f2

And fixed with

https://github.com/memcached/memcached/commit/dbb7a8af90054bf4ef51f5814ef7ceb17d83d974


As you should have thought, this kinda issue could be only triggered by UDP, as you cannot fake your TCP/IP address.
The geeks shall inherit the properties and methods of object earth.
Global Rank: 1
Totalscore: 759458
Posts: 437
Thanks: 495
UpVotes: 468
Registered: 15y 64d












The User is Offline
RE: MemcacheD amplification attack
Google/translate0Thank You!0Good Post!0Bad Post! link
I tried to access Context but I got a null-pointer exception. What DoS attacks? On OTW? WeChall? Are we under attack? *runs around screaming*

Also, you can easily spoof your TCP/IP address, it's just a bit harder to set up an actual session with it... ;)
Global Rank: 248
Totalscore: 87961
Posts: 1662
Thanks: 1350
UpVotes: 906
Registered: 16y 225d




Last Seen: 7h 58m
The User is Offline
RE: MemcacheD amplification attack
Google/translate0Thank You!0Good Post!0Bad Post! link
MemcacheD attacks were in the news.
I thought it might be of interest. Smile
The geeks shall inherit the properties and methods of object earth.
tunelko, quangntenemy, TheHiveMind, Z, balicocat, Ge0, samuraiblanco, arraez, jcquinterov, hophuocthinh, alfamen2, burhanudinn123, Ben_Dover, stephanduran89, braddie0, SwolloW, dangarbri, kalungmas have subscribed to this thread and receive emails on new posts.
1 people are watching the thread at the moment.
This thread has been viewed 12603 times.