LOIC LOW ORBIT ION CANNON HOW TO
How to use LOIC to perform a Dos attack: Just follow these simple steps to enact a DOS attack against a website (but do so at your own risk). A web application firewall can detect this type of attack easily. HTTP Attack: In this attack, the tool sends HTTP requests to the target server. Select the type of attack as TCP to use this. TCP Attack: This method is similar to UDP attack. Change the message string or leave it as the default. It has port 80 as the default option selected, but you can change this according to your need. UDP Attack: To perform the UDP attack, select the method of attack as UDP. In this way, the target server will no longer be able to respond to requests from legitimate users, effectively shutting it down. This tool continues sending requests to the target server after some time, the target server becomes overloaded. In the TCP and UDP attacks, the string is sent as a plain text but in the HTTP attack, it is included in the contents of a HTTP GET message.
The tool opens multiple connections to the target server and sends a continuous sequence of messages which can be defined from the TCP/UDP message parameter option available on the tool. All three methods implement the same mechanism of attack. Type of attacks: As I’d mentioned previously, the LOIC uses three different types of attacks (TCP, UDP and HTTP).
The bigger the botnet, the more powerful the attack is.įigure 2: Modified version of LOIC with an option for IRC connect A botnet is a system of compromised computer systems connected to each other via the internet, which are in turn controlled by the attacker who directs the malware toward his / her target. In that case, the user machine became part of a botnet. This allowed the tool to be remotely controlled, using the IRC protocol. It had an option to connect the client to the IRC (Internet Relay Chat). The LOIC version used by Anonymous group attacks was different than the original LOIC. See the basic screen of the tool in the snapshot above in Figure 1. Some other options include timeout, TCP/UDP message, Port and threads. You can select the method of attack on the target server. The tool has three chief methods of attack: TCP, UDP and HTTP. The IP address of the target is used in place of an internal local network where DNS is not being used. You can also enter the IP address of the target system. The tool takes the URL of the target server on which you want to perform the attack. A would-be hacker need only then select some easy options (address of target system and method of attack) and click a button to start the attack. The only thing a user needs to know for using the tool is the URL of the target. It’s a very easy tool to use, even by those lacking any basic knowledge of hacking. The tool is able to perform a simple dos attack by sending a large sequence of UDP, TCP or HTTP requests to the target server. The LOIC was originally developed by Praetox Technologies as a stress testing application before becoming available within the public domain. This tutorial is only for educational purpose i am not responsible for any damage caused by this tutorial. ViRobot tutorial is written by M Yahya Ahmed(creator of this blog). Microsoft HackTool:Win32/Oylecann.A 20130522 Sorry if I wasted your time guys, thanks! Was all.I'm probably totally wrong and all these programs compressed in this file is what probably is what helps the program do what it's job is. So what's the deal with all that? Also i'm not hating/disrespecting it just threw red flags in my head
Since it won't allow me to post websites for some odd reason just please go to Google type in online virus scanner which took me to virus total and submit LOIC-1.0.7.42- so you can scan it. Okay I downloaded Low-Orbit Ion Canon and used a virus scanner and it came up with a crap ton of viruses/malware whatever.