well..this s my work so far..i have learnt abt the attack and how it works..my project aim is to identify the DDos attack source using traceback technique..i have referred a lot from certain books..like hacking exposed...hacking the art of exploitation..all i need is the help for implementation..first i have to try implementing the attack..dont worry..i have already did setup virtual network for my expriment(VMware)..i need to knw much deeper abt the attack..and how to implement as well as to traceback the source..pls help me geeks...
-- You received this message because you are subscribed to the Google Groups "Google Code Jam" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/google-code?hl=en.
