Booter shell scripts are sophisticated, easy-to-use distributed denial of service (DDoS) attack scripts that make it possible to bring down web servers without vast networks of infected zombie computers. This cybersecurity threat advisory explains the origins of this form of attack and the methods it uses to infect web servers.
Booter shell scripts are customizable scripts that randomize attack signatures and make attacks more difficult to differentiate from legitimate traffic.
Attack data indicate that the DDoS threatscape is shifting towards the increased utilization of booters by malicious actors in the underground hacking communities. The web security threat posed by booter scripts has arisen from a variety of developments:
DDoS Booter Shell script can be deployed by almost anyone who purchases hosting or makes use of simple web application vulnerabilities such as RFI, LFI, SQLi and WebDAV exploits.The concept of infection also changes when discussing server-based attacks: