Quote:
Originally Posted by EmmeTheCoder
Correct me if I'm wrong, but isn't DDoS a Distributed-Denial of Service, which often are used by infected hosts that is controlled by the main attacker?
This way, all "they" can trace is the attackers, the infected hosts that most likely have no idea that they are flooding a server, but will never find the original attacker.
|
The only way you can track them is through the attackers IP. If they are using a VPN or a Proxy, then it can be complicated all after which one they are using.
Denial-of-service attack - Wikipedia, the free encyclopedia
Quote:
Originally Posted by ImmuneOne
You can't. They can.
|
No.
Let's say I have it setup like this:
My PC -> VPN 1 -> Server 1 -> VPN 2 -> Server 2 -> VPN 3 -> Attack -> Target
They would need to reverse my connection like this:
IP from VPN 3 -> IP from Server 2 -> IP from VPN 2 -> IP from Server 2 -> IP from VPN 1 -> My IP.
Then they would need to contact those who's having the VPNs, if it's not in the U.S. then it will be hard to get the informations out of the company and if the VPN is located in Russia, then they can't at all.
Now let's say all the data between your pc and the servers is also encrypted. Which means they would need to crack the encryption in order to get the data. That would be a hard task as well.
They would need to do that for all your connections.
Not that easy to backtrace.