Smurf attacks use a third-party system to attack a target. The third-party
system has directed broadcast enabled, and has a fat-pipe to the Internet.
The attacker can generate a huge flood of broadcasts from the third-party
system, without needing a fat-pipe connection of their own. The use of the
third-party system also makes tracking somewhat difficult.
On Sun, 1 Feb 1998, Rick Osteen wrote:
> Sorry for the ignorance, but what is a "Smurf Attack"?
> Thanks for any insight,
> Rick Osteen