>>109077
1. Scan the internet for hosts that reply with bigger packets than the UDP packets you sent out.
2. Make a program to send packets to these hosts with the source address of the packets spoofed to the target's address.
3. ???
4. PROFIT!!!
example:
1.
[A] —[ 5byte packet]→ [B]
[A] ←[100byte packet]— [B]
OH BOY. WE FOUND ONE.
2.
[A] —[ 5byte packet with source address of host C]→ [B]
[C] ←[100byte packet with source address of host C]— [B]
3.
???
4.
Lengthy prison sentence you can sell yourself with to security companies!!!