No, you commandeer zombie PCs under control of various worms/trojan horses and order them to ping a particular site to death.
Basically the server is bombarded with worthless data requests, crowding out legitimate site requests.
And its not that hard to do.
If it is bombarded, then the out to be able to see the IP addresses that are the source of it.
I’m on the Ping of Death honor roll. (Ancient history)
This didn’t involve hacking- it involved investigation of a vulnerability where a malformed PING request could make a server crash.
This went across operating system lines.