Associate
- Joined
- 20 Mar 2003
- Posts
- 2,323
- Location
- On the stool at the end of the bar
The longer it goes on the more traceable it is - if he'd have hit the site once for 2-3 days and left it at that, hadn't paid anyone directly and used a hijacked(unsecured)/open wireless to initiate the attack he'd be almost untraceable - but as time goes on and the attack changes vectors in reaction to security measures brought to mitigate it more and more clues and openings to identify atleast who is controlling it are left - and its very unlikely someone is coordinating a prolonged attack like this for free.
Totaly agree thus my (potentially wrong) assumption that this is beyond your average joe disgruntled customer/forum users.
In order to circumvent the security measures you need to have a certain amount of knowledge of how they work and even the order in which they would be logically applied so as to keep up the DDoS.
There is always a trail of evidence left behind any attack, it's a case of what is 'put' there to mislead and what is 'accidently' left behind