Principles of Key/Value Databases and Memcrashed Exploit
Write a report on the memcrashed vulnerability from 2018, including a description of memcached, the memcrashed exploit, solutions to defend against memcrashed, and predictions on its likely impact.
14 Pages3197 Words498 Views
Added on 2023-04-06
About This Document
This assignment discusses the principles of key/value databases and the memcrashed exploit. It explains how memcrashed works and provides solutions to prevent and mitigate the exploit. Study computer security with expert material at Desklib.
Principles of Key/Value Databases and Memcrashed Exploit
Write a report on the memcrashed vulnerability from 2018, including a description of memcached, the memcrashed exploit, solutions to defend against memcrashed, and predictions on its likely impact.
Added on 2023-04-06
ShareRelated Documents
End of preview
Want to access all the pages? Upload your documents or become a member.
Memcached Attack: Exploit, Strategies, and Mitigation
|12
|2676
|376
Memcrashed Vulnerability from 2018
|13
|2063
|440
Computer Security: Memcrashed Exploit and Solutions
|14
|3281
|184
Understanding Memcrashed Vulnerability: Key/Value Databases
|12
|3440
|424
Memcrashed Vulnerabilities: Impact, Exploits and Mitigation
|12
|4100
|244
Computer Security Engineering
|15
|3256
|143