The main aim of a reflector attack is to **redirect traffic**. In this type of attack, an attacker sends requests to a vulnerable third-party server with the source address spoofed to that of the target. The server then responds to the target, amplifying the effect and flooding it with unwanted traffic.


