Quote:
Originally Posted by EmmeTheCoder
I know what DoS and DDoS is, do you..? DDoS is often (very so) set up through a bot-net, a group of infected PCs spread all over the world is flooding the target, controlled by the main-attacker. There's no need for any proxy or such in this case, as the target will never be attacked from your IP-address.
On the other hand, you can trace one of the infected hosts and overview connections being made to it (the attacker when he launch an attack), and in this case it would be smart of you to go through a proxy or other.
|
Wouldn't that make it easier to track you down then?
YourPC->Bot1
PC->Bot2
PC->Bot3 etc, Wouldnt it be smarter if the infected computer go like
PC->Bot1->bot2->bot3->Bot4->Target
Because when you do PC->Bot1, PC->Bot2 they only have to backtrace your IP from one computer straight to yours, whereas if you only tell one bot to attack, it tells the next bot in the line to attack, and the next one, until theres nomore?