• 0 Posts
  • 15 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle









  • I honestly forgot what the first D was at that moment lol. While I agree it technically can be done pretty badly without distributed attacks. I read in the past couple of years of an approach attackers used was to make an application DOS itself from a single request. I think it required a vulnerability in the application in this instance though.