“…An extensive body of research on booters is available. These studies cover multiple lines of research including analyses of (1) the booters' leaked databases [10,21,23], (2) booter attacks [8,24,47,57], (3) victims of booters [38], (4) honeypots of servers commonly used for performing booter attacks [25,52], (5) the usage of these honeypots for attribution purposes [31], (6) TLS certificates used by booters [32], (7) booter blacklists and their origins [12,44,46,59], (8) the usage of these blacklists to understand the booter market [45], (9) ethical and legal aspects related to booters [16,18], and (10) the impact of law enforcement operations on booters from a commercial perspective [7,13]. Our contribution.…”