DNS Attack Vector #2

3 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$69.99
List Price:  $99.99
You save:  $30
€65.44
List Price:  €93.49
You save:  €28.05
£56.04
List Price:  £80.06
You save:  £24.02
CA$95.74
List Price:  CA$136.79
You save:  CA$41.04
A$107.11
List Price:  A$153.03
You save:  A$45.91
S$95.36
List Price:  S$136.24
You save:  S$40.87
HK$547.90
List Price:  HK$782.75
You save:  HK$234.85
CHF 64.03
List Price:  CHF 91.47
You save:  CHF 27.44
NOK kr772.60
List Price:  NOK kr1,103.76
You save:  NOK kr331.16
DKK kr487.88
List Price:  DKK kr697.01
You save:  DKK kr209.12
NZ$117.84
List Price:  NZ$168.36
You save:  NZ$50.51
د.إ257.06
List Price:  د.إ367.25
You save:  د.إ110.18
৳7,700.43
List Price:  ৳11,001.09
You save:  ৳3,300.65
₹5,837.33
List Price:  ₹8,339.41
You save:  ₹2,502.07
RM333.81
List Price:  RM476.90
You save:  RM143.08
₦92,489.99
List Price:  ₦132,134.22
You save:  ₦39,644.23
₨19,474.37
List Price:  ₨27,821.72
You save:  ₨8,347.35
฿2,588.61
List Price:  ฿3,698.17
You save:  ฿1,109.56
₺2,275.23
List Price:  ₺3,250.47
You save:  ₺975.23
B$358.08
List Price:  B$511.57
You save:  B$153.48
R1,312.98
List Price:  R1,875.77
You save:  R562.78
Лв127.91
List Price:  Лв182.73
You save:  Лв54.82
₩96,452.39
List Price:  ₩137,795.03
You save:  ₩41,342.64
₪267.73
List Price:  ₪382.49
You save:  ₪114.75
₱4,034.64
List Price:  ₱5,764.02
You save:  ₱1,729.38
¥11,065.06
List Price:  ¥15,807.91
You save:  ¥4,742.85
MX$1,201.03
List Price:  MX$1,715.83
You save:  MX$514.80
QR255.05
List Price:  QR364.38
You save:  QR109.32
P965.79
List Price:  P1,379.76
You save:  P413.97
KSh9,296.24
List Price:  KSh13,280.92
You save:  KSh3,984.67
E£3,349.82
List Price:  E£4,785.67
You save:  E£1,435.84
ብር3,985.10
List Price:  ብር5,693.24
You save:  ብር1,708.14
Kz58,375.85
List Price:  Kz83,397.65
You save:  Kz25,021.80
CLP$66,375.71
List Price:  CLP$94,826.51
You save:  CLP$28,450.80
CN¥507.11
List Price:  CN¥724.48
You save:  CN¥217.36
RD$4,113.13
List Price:  RD$5,876.15
You save:  RD$1,763.02
DA9,392.53
List Price:  DA13,418.47
You save:  DA4,025.94
FJ$158.35
List Price:  FJ$226.22
You save:  FJ$67.87
Q544.06
List Price:  Q777.27
You save:  Q233.20
GY$14,678.83
List Price:  GY$20,970.66
You save:  GY$6,291.82
ISK kr9,837.79
List Price:  ISK kr14,054.59
You save:  ISK kr4,216.80
DH708.72
List Price:  DH1,012.51
You save:  DH303.78
L1,246.75
List Price:  L1,781.16
You save:  L534.40
ден4,025.16
List Price:  ден5,750.48
You save:  ден1,725.31
MOP$565.76
List Price:  MOP$808.27
You save:  MOP$242.50
N$1,340.22
List Price:  N$1,914.68
You save:  N$574.46
C$2,582.07
List Price:  C$3,688.83
You save:  C$1,106.76
रु9,353.99
List Price:  रु13,363.42
You save:  रु4,009.42
S/263.57
List Price:  S/376.55
You save:  S/112.97
K270.82
List Price:  K386.91
You save:  K116.08
SAR262.50
List Price:  SAR375.01
You save:  SAR112.51
ZK1,859.31
List Price:  ZK2,656.27
You save:  ZK796.96
L325.94
List Price:  L465.65
You save:  L139.71
Kč1,644.39
List Price:  Kč2,349.23
You save:  Kč704.84
Ft25,720.62
List Price:  Ft36,745.32
You save:  Ft11,024.70
SEK kr762.14
List Price:  SEK kr1,088.81
You save:  SEK kr326.67
ARS$61,174.36
List Price:  ARS$87,395.69
You save:  ARS$26,221.33
Bs486.59
List Price:  Bs695.16
You save:  Bs208.56
COP$277,528.94
List Price:  COP$396,486.91
You save:  COP$118,957.97
₡35,172.98
List Price:  ₡50,249.28
You save:  ₡15,076.29
L1,732.56
List Price:  L2,475.19
You save:  L742.63
₲520,857.74
List Price:  ₲744,114.38
You save:  ₲223,256.64
$U2,703.34
List Price:  $U3,862.08
You save:  $U1,158.74
zł282.38
List Price:  zł403.41
You save:  zł121.03
Already have an account? Log In

Transcript

In this lecture, we'll be talking about the memcached DDoS attack, which is the cause of one of the biggest DDoS attacks of all time, will you voice. Now let's shortly define what memcached is, in case you haven't heard of it. It's a database caching system for speeding up the websites and networks. But instead of using traditional hard drives, memcached uses the ram random access memory. In other words, it works much faster than a regular caching system, because it uses the memory of the server, not the hard disk. As part of the protocol, when a server sees a memcached GET request, it collects the requested values from memory to form a response.

It does sends over the internet in an uninterrupted stream of multiple UDP packets. So basically, once the request comes in, it just sends it out as multiple UDP packets Each with a length of up to 1400 bytes. Up until now everything is fine. But the problem is it has no authentication. So it's easy to abuse. And how it is abused is basically the attacker can insert his request to open memcached server.

By default, memcached uses a limit of one megabyte per stored value. But an attacker can insert even larger volumes since any user can configure it. So here as we can see, lack of authentication. Long story short, any user can abuse the memcached protocol. And this is the basis of the attack. Now memcached is a quite popular way of catching since it's quite fast.

It's used by most of the social media platforms like Facebook, and Twitter. As a result, there are so many servers probably around 100 Thousand servers with this vulnerability. And therefore, the attack volume is huge hundreds of gigabytes or terabytes per second. Therefore, it's almost impossible to withstand without the CDN solution. We will be talking about CDs at the end of the course. But for now, you can consider it as a paid service to protect your environment.

Since there is almost no server, which can withstand such a big attack, without basically help. And that's what makes memcached is a special type of DDoS attack. You have basically no way to protect yourself by yourself. You cannot protect yourself as I just said, but you can at least in case you have a memcached server, prevent your server from being abused in an attack to other people. And the way to do that is actually quite simple. You need to configure the mem cache configuration file with it.

Text Editor. And first you need to find the M parameter, change the value to one gigabyte, then the URL parameter changes for you to localhost or to this value. And then you basically need to save the changes and restart to memcached server and what else you can do in order to prevent your memcached server from being abused. Disable UDP support. If you're not using it. Make sure firewall is in place, especially on port 11211, which is the port that memcached uses.

Prevent IP spoofing. Just double check if the source IP is spoofed or not. And most importantly, remember the amplification factor in the settings since it will reduce the effect of the attack even if your memcached server is being abused. Thanks to this at least it will not generate the large traffic that the attacker wants

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.