SOC Experts Community - Beta
2 like 0 dislike
in SOC by (5k points)

2 Answers

0 like 0 dislike
by (4.1k points)
  1. Use a botnet or an already compromised system to attack your target either directly or by tunneling your connection via the compromised host.

  2. Using Tor (the onion network)

  3. 3rd Party proxies like hidemyass etc...

0 like 0 dislike
by (5.4k points)
attackers hide their IP Addresses through spoofing

SOC Experts - No. 1 Job Oriented Cybersecurity Training Program

View our Courses