In 2018, GitHub was hit with a denial of service using an amplification attack. In this video, look at the GitHub attack and the way in which memcache was used to achieve an amplification factor of around 50,000 to create an overwhelming denial of service
- NTP isn't the only protocol we can use to amplify a … denial of service. There are many other amplification … protocols which can be used. And one which deserves … specific mention is the protocol used in the Memcached … software. … Memcached is a third party tool … used to cache objects in a systems memory. … And then retrieve those objects quickly. … Its used to speed up dynamic web applications … and its management features can be accessed using … TCP or UDP on port 11211 … Let's have a look at an example of a Memcached exchange … using Netcat … I'll use Netcat to make a simple connection to port 11211 … on a Memcached server … (typing) … and I'll issue the stats command … We get a response from the server of about 2000 characters … Which provides a respectable amplification factor of about … 400 … Of course using a TCP connection is quite safe and can't … be used to support a denial of service attack … But if the command were to be sent via UDP … With no session set up and with a spoofed source address …
Author
Updated
1/8/2021Released
3/25/2019- What is denial of service?
- TCP SYN, Smurf, and UDP flooding
- Deauthenticating a wireless host
- Flooding HTTP
- Using BlackEnergy
- Flooding a SIP server
- Detecting P2P attacks with PeerShark
- Defeating DoS attacks
Skill Level Intermediate
Duration
Views
Related Courses
-
Penetration Testing: Advanced Kali Linux
with Malcolm Shore2h 22m Intermediate -
Penetration Testing Essential Training
with Malcolm Shore2h 29m Intermediate -
Ethical Hacking: Hacking IoT Devices
with Luciano Ferrari35m 22s Intermediate
-
Introduction
-
Disclaimer1m 12s
-
1. What Is a Denial of Service?
-
2. Infrastructure Denial of Service
-
UDP flooding with LOIC3m 16s
-
ARP poisoning with Ettercap5m 13s
-
Using NTP to amplify attacks5m 55s
-
3. Wireless Denial of Service
-
4. Application Denial of Service
-
Understanding BlackEnergy6m 12s
-
Killing the FTP service1m 42s
-
RangeAmp attacks on the CDN1m 10s
-
5. SIP Service Attacks
-
Flooding a SIP server6m 9s
-
-
6. Ransomware
-
Explaining ransomware3m 42s
-
Understanding Cryptolocker2m 44s
-
Understanding Petya2m 28s
-
-
7. Mitigation Techniques
-
Commercial anti-DOS services1m 49s
-
Considering IoT denial2m 53s
-
Conclusion
-
Summary1m 2s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: NEW: Amplification using memcached