How to Hack Back Using Deception—Part 1
ATT&CK techniques detected
T1498Network Denial of Service
68%
") 6 these tactics work very well on automated tools and bots, which often waste their time either retrying or attempting to exploit non - existent vulnerabilities. nothing like having your network defenses give the impression that your site is slowing down under a ddos bot attack…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1498.001Direct Network Flood
40%
") 6 these tactics work very well on automated tools and bots, which often waste their time either retrying or attempting to exploit non - existent vulnerabilities. nothing like having your network defenses give the impression that your site is slowing down under a ddos bot attack…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Our systems are under constant attack, so why not try some deception to hack back at attackers? Delaying and diverting are effective methods—and easier to pull off than you might think.