#98 Add attacker side of the Memcrashed attack

Об'єднано
carlos.garcia злито 4 комітів з stefan.schmidt/memcrashed до SPIN/master 6 роки тому
Stefan Schmidt відкоментовано 6 роки тому

This attack simulates the attacker-side of a Memcached amplification attack (publicly known as "Memcrashed").

As discussed in the meeting, gateways typically only see one side of the attack (attacker -> server or server -> victim), which is why we split the implementation of Memcrashed into two attacks. This attack only implements the first part, the victim-side will follow shortly.

To specify the IP address of the victim, which is spoofed by the attacker, we introduced an additional parameter (ip.dst is occupied by the Memcached server).

This attack simulates the attacker-side of a Memcached amplification attack (publicly known as "Memcrashed"). As discussed in the meeting, gateways typically only see one side of the attack (attacker -> server or server -> victim), which is why we split the implementation of Memcrashed into two attacks. This attack only implements the first part, the victim-side will follow shortly. To specify the IP address of the victim, which is spoofed by the attacker, we introduced an additional parameter (ip.dst is occupied by the Memcached server).
Цей запрос було успішно влито!
Підпишіться щоб приєднатися до обговорення.
Без Мітки
Bug
Етап відсутній
Немає відповідального
1 учасників
Завантажується...
Скасувати
Зберегти
Тут ще немає жодного вмісту.