Which attack below spoofs the source IP of the intended victim and elicits hosts behind the network gateway into responding

Which attack below spoofs the source IP of the intended victim and elicits hosts behind the network gateway into responding with ICMP echo replyies which subsequently results in consuming all of the bandwidth that a target has available

CategoriesUncategorized

Leave a Reply

Your email address will not be published.