Hacking back in degrees
Before we get into this too much please check out the following:
The main issue with computer security and Cyber-Warfare today is that there is very little that most organizations on our side are willing to do when
it comes to hacking back against the attackers. There are a number of
good reasons for this, one being legal issues and collateral damage to
intermediary systems. However, it is an aspect of computer security that
needs to be addressed, especially for our customers.
Long story short, if we have overly stringent rules and our opponents do not, whom is going to win?
We have to get inside an attacker’s OODA loop and change the dynamics in such a way they did not expect.
Hence, offensive countermeasures should be considered.
This is quite a bit different than seeing an attack from an IP address, then attacking that IP address. Rather it requires some subtle
techniques that we can utilize on the inside of a network after an attacker has
comprised the perimeter. And trust me, they will get in.
So this site is dedicated to finding ways to hack back. It is also dedicated to finding ways to get attribution on who the attackers are and where they are coming from.
Please, understand that we are also about options. We want to provide ways to find out as much as possible about an attacker, all the way to getting access to an attacker's system.
Finally, we want to illuminate the legal issues surrounding this topic. Time to fight FUD with fact. There is case law. Hacking back has been done. It just requires a bit of research and finesse.