MORE DOSing! [message #30023] |
Sat, 12 July 2003 00:49 |
PiMuRho
Messages: 494 Registered: February 2003
Karma:
|
Commander |
|
|
Infinint | well if you moditerd the connection to the server 24 7 entill the hacker came you would be abill to see when he enterd the server then you could snach his IP for later use and get in his comp though the connection he made and start takeing sytem critical files :twisted:
|
Riiiiiight....
These attackers use botnets - a bunch of IRC "bots" that are running on the computers of people that have unwittingly installed a trojan. The attacker basically gives the bots a target, and uses their combined bandwidth to perform the attack. The only IP you'd ever get (assuming it wasn't spoofed anyway) is from one of the trojan-infected PCs.
As for "taking system critical files" - sure. Someone with the savvy to perform this kind of attack has open shares on his system root..... :rolleyes:
Dev Diary
|
|
|