Flaws of the "System"
#9
Trust me, you can't trace an attack, unless you are the goverment. It's a huge process.

Anyhow, I'll make a small flow diagram.

Booter - Login In to booter CP > Send request to server > Server sends packets to IP.

Botnet - Open DDoSer > Send Request to victims > Victim machines attack IP

This process in no way involved reveals the IP of the attacker.


Messages In This Thread
Flaws of the "System" - by wweee2345 - 01-05-2012, 02:06 AM
RE: Flaws of the "System" - by Noobias - 01-05-2012, 02:27 AM
RE: Flaws of the "System" - by wweee2345 - 01-05-2012, 02:54 AM
RE: Flaws of the "System" - by NiT GriT - 01-05-2012, 02:30 AM
RE: Flaws of the "System" - by UTLonghorn12 - 01-05-2012, 03:21 AM
RE: Flaws of the "System" - by kertopz - 01-05-2012, 04:07 AM
RE: Flaws of the "System" - by wweee2345 - 01-05-2012, 04:24 AM
RE: Flaws of the "System" - by Tank - 01-05-2012, 04:22 AM
RE: Flaws of the "System" - by Tank - 01-05-2012, 04:33 AM
RE: Flaws of the "System" - by UTLonghorn12 - 01-05-2012, 04:47 AM
RE: Flaws of the "System" - by Temar - 01-05-2012, 04:51 AM
RE: Flaws of the "System" - by Lani - 01-05-2012, 04:15 PM
RE: Flaws of the "System" - by Toby - 01-05-2012, 04:07 PM
RE: Flaws of the "System" - by Biowulf - 01-05-2012, 05:15 PM

Forum Jump:


Users browsing this thread: 2 Guest(s)