logo

Memcrashed Vulnerability from 2018

   

Added on  2023-04-08

13 Pages2063 Words440 Views
Running Head:MEMCRASHED VULNERABILITY FROM 2018
MEMCRASHED VULNERABILITY FROM 2018
Name of the Student
Name of the University
Author Note

1MEMCRASHED VULNERABILITY FROM 2018
Executive Summary
The aim of this report is to understand how memcached works and how it is used. The report
includes description regarding memcrashed exploit and solution related to memcrash exploit
is also provided. In this report analysis regarding the future importance and effectiveness are
also discussed in details in the following sections.

2MEMCRASHED VULNERABILITY FROM 2018
Table of Contents
Introduction................................................................................................................................3
Discussion..................................................................................................................................4
Memcached working structure...............................................................................................4
Memcached vulnerability.......................................................................................................5
Trend of the protocols abused in Reflection attacks..........................................................5
Memcached DDoS reflection attack..................................................................................5
Ransom request left on Memcached server.......................................................................5
Solution to Memcached exploit.............................................................................................6
Memcached Users..............................................................................................................6
System administrators........................................................................................................6
Developers..........................................................................................................................6
Principle of Key-Value Database...........................................................................................7
Examples of Key-value Stores...............................................................................................7
Uses of Key-Value Database.................................................................................................8
Future importance and effectiveness of memcached.............................................................9
Conclusion..................................................................................................................................9
References................................................................................................................................11

3MEMCRASHED VULNERABILITY FROM 2018
Introduction
Memcached can be defined as distributed memory catching service speed up websites
which are dynamically driven and also Internet services by catching information and objects
in Random Access Memory. Memcached is absolutely free software which is licensed under t
Revised BSD. It is deployed in datacenter, IaaS connections and clouds as well. The survey
that was done by Rapid7 and SANS ISC, comes with the report that there are currently
100,000 memcached servers that are exposed in the Internet protocol. This report describes
about the memcrashed vulnerability from 2018.The discussion will also be related to how
memcrashed works and it is used. Analysis related to the solutions of the memcrashed
problems are also provided in this report. The analysis also include future importance and
effectiveness of memcrashed. The discussion also focuses on the discussion related to key-
value database, simple examples related to it and uses of key-value database, and how it is
related to memcached.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Memcrashed Vulnerabilities: Impact, Exploits and Mitigation
|12
|4100
|244

Vulnerabilities Related to Memcached
|17
|3883
|338

Understanding Memcrashed Vulnerability: Key/Value Databases
|12
|3440
|424

Principles of Key/Value Databases and Memcrashed Exploit
|14
|3197
|498

Memcrashed Vulnerability: Exploits, Impact, and Mitigation
|18
|3791
|408

Report on Memcrashed Vulnerability
|15
|4454
|413