Tagged: DDOS DOSThis topic has 3 replies, 2 voices, and was last updated 5 years ago by Zaid Sabih.Viewing 3 posts - 1 through 3 (of 3 total)AuthorPosts April 7, 2020 at 3:29 pm #33334 Zaid SabihModeratorDoing this depends on the target system, anyway you cannot do it from one computer, you need a large number of devices, so you usually never use your own computer for this therefore hiding the IP is never an issue. April 7, 2020 at 5:47 pm #33349 Sithum Nimlaka AbeydheeraParticipantIf so how is it done ? April 8, 2020 at 3:23 pm #33442 Zaid SabihModeratorI don’t cover it in any of my courses as there is no ethical hacking scenario where you need this. AuthorPosts Viewing 3 posts - 1 through 3 (of 3 total) You must be logged in to reply to this topic.