In the past two days, I downloaded an e-book named ebook.exe from a website. As a result, I was recruited by the machine and installed a lot of rogue software for me. I also removed the old Google and Alexa tool and replaced it with a hundred dogs.
The machine is slow, occupies space, and carries viruses. Angry! I wanted to mislead the main site of all these rogue software and the one who misled me to download the virus and install the rogue software.ProgramAll websites of ebook.exe are under attack. However, the power of a person is too small. It would be nice to have more people.
Now, end users like me have no choice but to do this kind of rogue behavior. All of them have an idea of whether it is feasible from the legal point of view or not, and the technology should not be a problem.
As a DDoS attack software, Users download and install the software on the local machine. The relationships between these machines are similar to those of Bt. None of them are master servers (of course, a directory server is required, used to find out which peers are going online), any one of them can organize other users with the software to attack the target website together. If the control is lax, it can be initiated together by default; if the control is strict, the attack can only be carried out with the consent of other classes where the software is installed. In either case, you must control the number of daily or hourly attacks on each client to avoid abuse by a few people.
This is equivalent to a DDoS attack alliance.
This idea mainly involves legal issues. I don't know if you know about this. You can give me some advice.