Who’s the Botnet? - Bots are global infected machines turned into “zombies” that follow instructions. The anatomy of any DDoS is Attacker > Botnet > Victim. We’ll deconstruct the attack and attempt to reveal its architecture, strategies, actors, or additional “criminal” knowledge.
To know how to trace a DDoS attack and identify who is DDoS-ing you, let’s see who is involved in the attack’s architecture. To Uncover a DDoS Attack, Reverse-Engineer it!
They attempt to create larger smoke screens that conceal their identities and anonymize their cyberattacks. DDoS attackers build and control botnets with techniques like onion routing, P2P, and obfuscation. The new breed of DDoS is also becoming stealthier and harder to trace. DDoS-ers may only launch a DDoS to install backdoors (via Trojans or Malware) to gain complete control.ĭDoSers install backdoors in compromised servers to later command and control.
Tracking a “Distributed” attack coming from thousands of i nfected machines turned into bots is no easy task. The first “D” in the compound word “DDoS” is the big problem. Can you really track a DDoS attack? Would you be able to find who’s behind the attack? Who’s DDoSing you?