
A record breaking DDoS attack. [Research Saturday]
CyberWire Daily
00:00
What Is This Device and How Do I Talk to It?
Using real world attacks, we were able to passively identify some sources that we could talk to. The one thing that reflection attack can't hide is the true source of the reflection note. If you sent anything, a question mark or a space, it would dump back a help screen. So right there, you basically had self documentation of all the capabilities of the device.
Play episode from 07:54
Transcript


