This attack is similar to the ping flood attack but with a clever modification to the process.
这种攻击类似于ping洪水攻击,但它能巧妙地修改进程。
At the low end, a ping flood can be used to uncover information covertly, but throttle up the packets being sent to a target or victim so that now, the system will go offline or suffer slowdowns.
对于低级的攻击,ping流可用于偷偷地查找信息,但是如果要截取向目标发送的包,则要求系统离线或停机。
At the low end, a ping flood can be used to uncover information covertly, but throttle up the packets being sent to a target or victim so that now, the system will go offline or suffer slowdowns.
对于低级的攻击,ping流可用于偷偷地查找信息,但是如果要截取向目标发送的包,则要求系统离线或停机。
应用推荐