DDoS reflection and amplification

Instead of attacking your target directly in DDoS attack - you can instead find legitimate services that respond to requests (for example when opening a TCP connection). You can make requests to such services where you spoof the source IP as your target. This has two advantages:

  • It is hard to block as the servers sending the request to the target could be services it relies upon or would need to talk to.
  • The services that could blocks the requests are not the same as the one that is suffering the damage causing a coordination issue.