![]() Multiply this by however fast you can stuff UDP packets into the server's incoming packet buffer per frame, times 7500+ public COD4 servers, and you can really bring a victim to its knees with a serious flood of unwanted packets. They send a small UDP packet, and the server replies with a larger packet to the faked address. ![]() ![]() So we're getting reports of DDoS attacks, where botnets will send infostring queries to COD4 dedicated servers as fast as possible with spoofed addresses.
0 Comments
Leave a Reply. |