Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/scanner/memcached/memcached_amp.md
Views: 11655
Vulnerable Application
Any instance of memcached with the UDP listener enabled will suffice.
Instructions for testing against Ubuntu 16.04, CentOS 7 and a Dockerized endpoint are provided below.
Ubuntu 16.04
To a desktop or server Ubuntu 16.04 instance, simply install memcached:
Then configure it to listen on something other than the loopback interface:
CentOS 7
To a CentOS 7 instance, simply install and start memcached, as it listens on 0.0.0.0 by default'
Docker Install
In memcached 1.5.5 and earlier, the daemon is vulnerable by default. As such, we can use the community supported memcached container and simply expose it:
Verification Steps
Install the application
Start msfconsole
Do:
use auxiliary/scanner/memcached/memcached_amp
Do:
set rhosts [IPs]
Do:
run
Confirm that the endpoint is discovered vulnerable to the memcached amplification vulnerability.
Scenarios
Ubuntu 16.04
Configure memcached as described above.
CentOS 7
Configure memcached as described above.
Docker
Configure memcached in docker as described above.