Hackers use several attack techniques. These attacks can be grouped into three different families:
Collateral attack by bounce.
Attacks by indirect answers.
We will see in detail these three families.
This is the simplest of attacks. The hacker attack directly from the victim's computer. Most of the "script kiddies" using this technique. Indeed, they are using hack programs are only loosely definable, and many of these programs send packets directly to the victim.
If you get attacked in this way, there are great chances for you to trace the origin of the attack, identifying the same time the identity of the attacker.
Collateral attack by rebound
This attack is very popular with hackers. Indeed, the rebound has two advantages:
Hide the identity (IP address) of the hacker.
If necessary, use the computer resources through because it is more powerful (CPU, bandwidth ...) to attack.
The principle itself is simple: the attack packets are sent through the computer, which affects the attack to the victim. Hence the term rebound.
The attack FTP Bounce is part of this family of attack. If you are a victim of such attacks, it is not easy to trace the source. At its simplest, you will head to the computer intermediates.
Collateral attack in response
This attack is a derivative of the bounce attack. It offers the same advantages in terms of the hacker. But instead of sending an attack through the computer so that the repercussions, the attacker will send a query. And it is this response to the request will be sent to the victim computer.
Again, it is not easy to trace the source ...
Conclusion : When you attack, it can be done directly or via one or more intermediate computers.Understanding the attack will let you know how to go back to the hacker.