Just genuinely curious that seems to be the wolf cry rallying point at the moment so I'm wondering how it actually works?
How does a DDoS attack allow a server image to be captured?
Just genuinely curious that seems to be the wolf cry rallying point at the moment so I'm wondering how it actually works?
[9 Points] ownowfuck:
[3 Points] reprapraper:
If you're referring to the shutdown of the first iteration of the silk road (technically second lol), I believe that the leading theory is that the ddos was used to locate the server.
[2 Points] gwern:
http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf 'Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization', Biryukov et al 2013 might be a good starting point.
[0 Points] pugetF:
Or the server can be ddos and force a reboot, then exploits on boot sequence can be used.
[0 Points] None:
[deleted]
1: DDOS specific Onion Domain 2: Analyze network traffic, pinpoint location through analysis 3: Subpoena host, or work diplomatic channels to get host information 4: Host provides server image to Law Enforcement 5: Law Enforcement ascertains location, and notifies necessary authorities 6: Action is taken