Low Orbit Ion Cannon
Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application. written in C#.LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP packets or UDP packets and with the intention of disrupting the service of a particular host.LOIC is an application developed by 4Chan-affiliated hackers designed to—when used en masses by thousands of anonymous users—launch
Distributed Denial of Service (DDoS) attacks on websites.People have used LOIC to join voluntary botnets.
application...The idea behind LOIC is that it can allow you to participate in attacks even if you've no clue how to hack. LOIC available for Windows, Mac, and Linux.punch in the target information like a URL or an IP address and zap.
The LOIC version used by Anonymous group attacks was different than the original LOIC. It had an option to connect the client to the IRC (Internet Relay Chat). This allowed the tool to be remotely controlled, using the IRC protocol. In that case, the user machine became part of a botnet. A botnet is a system of compromised computer systems connected to each other via the internet, which are in turn controlled by the attacker who directs the malware toward his / her target. The bigger the botnet, the more powerful the attack is.
Type of attacks:LOIC uses three different types of attacks (TCP, UDP and HTTP). All three methods implement the same mechanism of attack. The tool opens multiple connections to the target server and sends a continuous sequence of messages which can be defined from the TCP/UDP message parameter option available on the tool. In the TCP and UDP attacks, the string is sent as a plain text but in the HTTP attack, it is included in the contents of a HTTP GET message.This tool continues sending requests to the target server; after some time, the target server becomes overloaded. In this way, the target server will no longer be able to respond to requests from legitimate users, effectively shutting it down.
UDP Attack: To perform the UDP attack, select the method of attack as UDP. It has port 80 as the default option selected, but you can change this according to your need. Change the message string or leave it as the default.
TCP Attack: This method is similar to UDP attack. Select the type of attack as TCP to use this.
HTTP Attack: In this attack, the tool sends HTTP requests to the target server. A web application firewall can detect this type of attack easily.
How to use LOIC to perform a Dos attack: Just follow these simple steps to enact a DOS attack against a website (but do so at your own risk).
Step 1: Run the tool.
Step 2: Enter the URL of the website in The URL field and click on Lock O. Then, select attack method (TCP, UDP or HTTP). I will recommend TCP to start. These 2 options are necessary to start the attack.
Step 3: Change other parameters per your choice or leave it to the default. Now click on the Big Button labeled as “IMMA CHARGIN MAH LAZER.” You have just mounted an attack on the target.
After starting the attack you will see some numbers in the Attack status fields. When the requested number stops increasing, restart the LOIC or change the IP. You can also give the UDP attack a try. Users can also set the speed of the attack by the slider. It is set to faster as default but you can slow down it with the slider. I don’t think anyone is going to slow down the attack.
IDLE: It shows the number of threads idle. It should be zero for higher efficiency of the attack.
Connecting: This shows the number of threads that are trying to connect to the victim server.
Requesting: This shows the number of threads that are requesting some information from the victim server.
Downloading: This shows the number of threads that are initiating some download for some information from the server.
Downloaded: This number shows how many times data downloading has been initiated from victim server on which you are attacking.
Requested: This number shows how many times a data download has been requested from victim server.
Failed: This number shows how many times the server did not respond to the request. A larger number in this field means the server is going down. The success of the attack can be measured by the number shown in this field
Download:
Distributed Denial of Service (DDoS) attacks on websites.People have used LOIC to join voluntary botnets.
application...The idea behind LOIC is that it can allow you to participate in attacks even if you've no clue how to hack. LOIC available for Windows, Mac, and Linux.punch in the target information like a URL or an IP address and zap.
The LOIC version used by Anonymous group attacks was different than the original LOIC. It had an option to connect the client to the IRC (Internet Relay Chat). This allowed the tool to be remotely controlled, using the IRC protocol. In that case, the user machine became part of a botnet. A botnet is a system of compromised computer systems connected to each other via the internet, which are in turn controlled by the attacker who directs the malware toward his / her target. The bigger the botnet, the more powerful the attack is.
Type of attacks:LOIC uses three different types of attacks (TCP, UDP and HTTP). All three methods implement the same mechanism of attack. The tool opens multiple connections to the target server and sends a continuous sequence of messages which can be defined from the TCP/UDP message parameter option available on the tool. In the TCP and UDP attacks, the string is sent as a plain text but in the HTTP attack, it is included in the contents of a HTTP GET message.This tool continues sending requests to the target server; after some time, the target server becomes overloaded. In this way, the target server will no longer be able to respond to requests from legitimate users, effectively shutting it down.
UDP Attack: To perform the UDP attack, select the method of attack as UDP. It has port 80 as the default option selected, but you can change this according to your need. Change the message string or leave it as the default.
TCP Attack: This method is similar to UDP attack. Select the type of attack as TCP to use this.
HTTP Attack: In this attack, the tool sends HTTP requests to the target server. A web application firewall can detect this type of attack easily.
How to use LOIC to perform a Dos attack: Just follow these simple steps to enact a DOS attack against a website (but do so at your own risk).
Step 1: Run the tool.
Step 2: Enter the URL of the website in The URL field and click on Lock O. Then, select attack method (TCP, UDP or HTTP). I will recommend TCP to start. These 2 options are necessary to start the attack.
Step 3: Change other parameters per your choice or leave it to the default. Now click on the Big Button labeled as “IMMA CHARGIN MAH LAZER.” You have just mounted an attack on the target.
After starting the attack you will see some numbers in the Attack status fields. When the requested number stops increasing, restart the LOIC or change the IP. You can also give the UDP attack a try. Users can also set the speed of the attack by the slider. It is set to faster as default but you can slow down it with the slider. I don’t think anyone is going to slow down the attack.
IDLE: It shows the number of threads idle. It should be zero for higher efficiency of the attack.
Connecting: This shows the number of threads that are trying to connect to the victim server.
Requesting: This shows the number of threads that are requesting some information from the victim server.
Downloading: This shows the number of threads that are initiating some download for some information from the server.
Downloaded: This number shows how many times data downloading has been initiated from victim server on which you are attacking.
Requested: This number shows how many times a data download has been requested from victim server.
Failed: This number shows how many times the server did not respond to the request. A larger number in this field means the server is going down. The success of the attack can be measured by the number shown in this field
Download:
http://rapidgator.net/file/a4fdd4a401edc20c254efdccf7cf3c6a