This is just simplistic, ill conceived rubbish. There is absolutely no
way to guarantee that you are tracking down the correct IP or the
correct person. How can you possibly rely on the TTL to distinguish the
address of the attacker among thousands of DNS requests? The TTL can
be forged on
In some mail from [EMAIL PROTECTED], sie said:
[...]
The Resolution Theory
The idea is simple. Usually, when a denial of service attack is
initiated against a target host, it's something like:
# ./attack target.com
In order to send the spoofed packets to