
If you follow news related to hacking and security issues, you doubtless have been hearing about this tool for the past several months. If you use the same connection for internal software, employees notice slowness issues.A LOIC (Low Orbit Ion Cannon) is one of the most powerful DOS attacking tools freely available. The TTL (time to live) on a ping request times out. Your server responds with a 503 due to service outages. There are several clues that indicate an ongoing DDoS attack is happening: An IP address makes x requests over y seconds.
Ddos Attack Tool For Windows Download It And
In the past few years, it has been used many times by hackers against big company’s network, so we can never deny the possibility of attack.It is important to note that DDoS attacks are executed differently to DoS attacks as well. LOIC is the most used and most popular DoS attacking tool. The group not only used this tool, but also requested that others download it and join Anonymous attacks via IRC.Ddos Tools Attack Software Quick Heal AntiVirus for Linux v.10.00 Anti-virus software with a proactive defense Quick Heal AntiVirus for Linux protects the system from computer viruses, prevent their spreading and disinfect the infected files.Although most of these tools are only for DoS attacks, a few tools support a zombie network for DDoS attacks. This tool was also the weapon of choice implemented by the (in)famous hacker group, Anonymous, who have claimed responsibility for many high profile hacking attacks, among them, hacks against Sony, the FBI and other US security agencies.

See the basic screen of the tool in the snapshot above in Figure 1.The LOIC version used by Anonymous group attacks was different than the original LOIC. Some other options include timeout, TCP/UDP message, Port and threads. You can select the method of attack on the target server. The tool has three chief methods of attack: TCP, UDP and HTTP. The IP address of the target is used in place of an internal local network where DNS is not being used. You can also enter the IP address of the target system.
The tool opens multiple connections to the target server and sends a continuous sequence of messages which can be defined from the TCP/UDP message parameter option available on the tool. All three methods implement the same mechanism of attack. The bigger the botnet, the more powerful the attack is.Figure 2: Modified version of LOIC with an option for IRC connect Type of attacksAs I’d mentioned previously, the LOIC uses three different types of attacks (TCP, UDP and HTTP). A botnet is a system of compromised computer systems connected to each other via the internet, which are in turn controlled by the attacker who directs the malware toward his / her target. In that case, the user machine became part of a botnet. This allowed the tool to be remotely controlled, using the IRC protocol.
Select the type of attack as TCP to use this.HTTP Attack: In this attack, the tool sends HTTP requests to the target server. Change the message string or leave it as the default.TCP Attack: This method is similar to UDP attack. It has port 80 as the default option selected, but you can change this according to your need. Analysis of the attackUDP Attack: To perform the UDP attack, select the method of attack as UDP. In this way, the target server will no longer be able to respond to requests from legitimate users, effectively shutting it down.
Step 3: Change other parameters per your choice or leave it to the default. These 2 options are necessary to start the attack.Figure3: LOIC in action (I painted the URL and IP white to hide the identity of the victim in snap) I will recommend TCP to start. Then, select attack method (TCP, UDP or HTTP). Step 2: Enter the URL of the website in The URL field and click on Lock O.
Users can also set the speed of the attack by the slider. You can also give the UDP attack a try. When the requested number stops increasing, restart the LOIC or change the IP.
Requesting: This shows the number of threads that are requesting some information from the victim server. Connecting: This shows the number of threads that are trying to connect to the victim server. It should be zero for higher efficiency of the attack. IDLE: It shows the number of threads idle. I don’t think anyone is going to slow down the attack.
With this, users can connect their client to an IRC server. The success of the attack can be measured by the number shown in this field.The windows version of LOIC has a feature called HIVEMIND. A larger number in this field means the server is going down. Failed: This number shows how many times the server did not respond to the request. Requested: This number shows how many times a data download has been requested from victim server. Downloaded: This number shows how many times data downloading has been initiated from victim server on which you are attacking.
The more people that joined the attack via IRC, the more powerful the attack became.To start LOIC in HIVEMIND mode, run this command in the command prompt:After running the above command, your LOIC client will connect to irc://irc.server.adress:6667/loicYou can also set more parameters in the command to use the tool in better way. (The attack was called “Operation Pay-back.”)In this mode, thousands of system attacks on a single website to made a real impact. This method was used to collect more people in the DDOS attack against Visa, Mastercard, and other financial organizations that supported Wikileaks. But connecting to an IRC server will not allow a remote administration of your machine or any other risks to your system: it will only control your LOIC client.
This web- based tool runs only on JavaScript-enabled web browsers. Web-based LOIC (JS LOIC)This version of LOIC was released on 9 th December, 2010. Just add /HIDDDEN in your command.LOIC.exe /hidden /hivemind irc.server.addressIt will connect LOIC client to irc://irc.server.adress:6667/loic without any visible GUI on windows. Running in hidden mode means LOIC will run without any visible GUI at your windows system.

According to them, all your request packets will be forwarded to the server system by proxy at the end. But some analysts say that this can be used with a proxy server if the proxy is robust enough. So you will not be able to launch a DOS attack on the server effectively while using a proxy. Attackers cannot use proxies in these attacks because your requests will hit the proxy server, not the target server. If you are thinking that we can use proxies to solve this problem, you are wrong.
Every website owner or server administrators should monitor the traffic and all the activities being performed on the server. And a server administrator can see the request logs to identify the IP and block the IP from the server. A well-configured firewall is enough to prevent the attack from being fully effective. Anyone that wants to can attack a website with this tool.As discussed above, the attack of this tool is simple and easy to identify.
The group known as Anonymous used this tool to attack these websites, but it was not traceable. ConclusionIn past few months, this tool was downloaded millions of times and used against some big websites such as Mastercard, Visa, and PayPal to support Wikileaks. Protecting the server with a Firewall configured to filter the packets sent by the LOIC is the best way to protect against the attack. But this will not help you when a network of LOIC clients will fire on the server system all at once.
