Name: Anonymous 2010-12-30 16:32
What exactly does it exploit?
I just can't seem to be able to pin it down.
It seems to work through TOR (videos), therefore it must be really bandwidth light.
Seems to me it first sends a couple of specific packets that take down the target, and then every t sends a "keep-down" packet.
An amazing piece of software, props to whoever it's creator is.
I just can't seem to be able to pin it down.
It seems to work through TOR (videos), therefore it must be really bandwidth light.
Seems to me it first sends a couple of specific packets that take down the target, and then every t sends a "keep-down" packet.
An amazing piece of software, props to whoever it's creator is.