CyberWire Daily cover image

A record breaking DDoS attack. [Research Saturday]

CyberWire Daily

00:00

What Is This Device and How Do I Talk to It?

Using real world attacks, we were able to passively identify some sources that we could talk to. The one thing that reflection attack can't hide is the true source of the reflection note. If you sent anything, a question mark or a space, it would dump back a help screen. So right there, you basically had self documentation of all the capabilities of the device.

Play episode from 07:54
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app