How does a DDoS attack allow a server image to be captured?

Just genuinely curious that seems to be the wolf cry rallying point at the moment so I'm wondering how it actually works?


Comments


[9 Points] ownowfuck:

1: DDOS specific Onion Domain 2: Analyze network traffic, pinpoint location through analysis 3: Subpoena host, or work diplomatic channels to get host information 4: Host provides server image to Law Enforcement 5: Law Enforcement ascertains location, and notifies necessary authorities 6: Action is taken


[3 Points] reprapraper:

If you're referring to the shutdown of the first iteration of the silk road (technically second lol), I believe that the leading theory is that the ddos was used to locate the server.


[2 Points] gwern:

http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf 'Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization', Biryukov et al 2013 might be a good starting point.


[0 Points] pugetF:

Or the server can be ddos and force a reboot, then exploits on boot sequence can be used.


[0 Points] None:

[deleted]