![]() Responses range from 52 bytes to 281 bytes, providing an average amplification factor of about 5. In some cases-such as when the server uses the Simple Service Discovery Protocol to locate universal plug-and-play gateways on end users’ broadband modems-the Plex service registration responder gets exposed to the general Internet. The software runs on Windows, macOS, and Linux. The Plex Media Server is software that lets people access the music, pictures, and videos they store on one device with other compatible devices. On Thursday, DDoS mitigation service Netscout said that DDoS-for-hire services recently turned to misconfigured Plex Media Servers to amplify their attacks. Other amplifiers include misconfigured DNS servers and the Network Time Protocol, to name only three. One of the most powerful amplifiers used in the past was the memcached database caching system, which can magnify payloads by a factor of 51,000. When the third parties respond, the replies go to the target rather than the attacker device that sent the request. Further Reading In-the-wild DDoSes use new way to achieve unthinkable sizesSo-called amplification attacks work by sending the third parties requests that are manipulated so they appear to have come from the target.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |