Once launched, LOIC opens multiple connection requests for a target server. The TCP and UDP modes send message strings and packets to select ports on the target, while the HTTP flood mode sends an endless volley of GET requests. To use LOIC, a perpetrator simply launches the application, enters a target URL or IP and then designates whether to launch a TCP, UDP or HTTP flood. It used internet relay chat servers to hijack junk traffic generated by users, thereby enabling individual perpetrators to create a botnet and stage attacks without prior coordination. The LOIC version used in the above attacks contained a so-called HIVEMIND mode. Operation Payback – This widespread 2010 campaign targeted anti-piracy organizations, Visa, MasterCard, PayPal, Sony and the PlayStation network.Project Chanology – Launched in 2008, this campaign targeted the Church of Scientology for issuing a copyright violation against YouTube in an effort to have one of its videos removed.LOIC has been used in a number of high profile DDoS attacks, including: For an attack to succeed, thousands of users must coordinate and simultaneously direct traffic to the same network. However, a single LOIC user is unable to generate enough requests to significantly impact a target. JS LOIC-a JavaScript version of the application-and the web-based Low Orbit Web Cannon have also been released.ĭDoS perpetrators use LOIC to flood target systems with junk TCP, UDP and HTTP GET requests. Low Orbit Ion Cannon (LOIC) is a widely available, open-source application developed by Praetox Technologies used for network stress testing, as well as denial of service (DoS) and distributed denial of service (DDoS) attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |