Erica wants to conduct an amplified DDoS attack against a system. What key step is required as part of her attack?
Answer Options
Reversing the target's IP address
Spoofing the target's IP address
Conducting an on-path attack to send traffic to the target
Spoofing responses from the amplification system to the target
Correct Answer: B
Explanation
Amplification attacks typically use spoofed User Datagram Protocol (UDP) queries sent to servers to increase the volume of traffic sent in response to the target. Erica's process might involve identifying large DNS responses she can get with a small query, then spoofing a target system's IP address in the packets she sends to DNS servers. They would then respond with the large responses, amplifying her requests and creating a distributed denial-of-service attack by using many servers to amplify her traffic. This doesn't require reversing an IP address, conducting an on-path attack, or spoofing the responses from the servers.