Man of Honour
- Joined
- 30 Jun 2005
- Posts
- 9,515
- Location
- London Town!
snip
![]()
yep that simple, but posting that might be close to the line!
snip
![]()
All of those things basically.
You could keep adding more internet connections to your present server and setting up server clusters to keep abreast of the processing and bandwidth requirements but it would quickly become very costly.
So its impossible to find out who is carrying out the attacks unless someone tells you who is the person?
Or you can work with the upstream provider and block off the connections / data before it ever gets here.
So its impossible to find out who is carrying out the attacks unless someone tells you who is the person?
It is near impossible as said many times in this thread, the nature of a DDoS attack means the attacker could start these attacks in a number of locations via a number of proxies/a public library computer/a hacked wifi connection.
[TW]Fox;13335490 said:I've never really understood the hatred. If you dislike a particular shop that much surely the best course of action is to simply shop elsewhere![]()
Only when you're spending time at Her Majesty's leisureOk, ill admit it. It was me, can I have my ten grand now ?
Basically, you need to find the person sending the control commands, as they'll never actually be part of the attack themselves that's devilishly difficult.
Best option is...
(if they're tragicomically stupid) get yourself infected by the botnet carrying out the attack, monitor your inbound traffic and watch for the control signal. Only works if you can get yourself infected (pretty hard if you want to trace a specific attack) and they're utterly dumb enough not to hide the source of the control commands (quite common actually, most people behind this are just script kiddies after all with no real idea)