![]() Attack descriptionTo use LOIC, a perpetrator simply launches the application, enters a target URL or IP and then designates whether to launch a TCP, UDP or HTTP flood. It used internet relay chat servers to hijack junk traffic generated by users, thereby enabling individual perpetrators to create a botnet and stage attacks without prior coordination. – This widespread 2010 campaign targeted anti-piracy organizations, Visa, MasterCard, PayPal, Sony and the PlayStation network.The LOIC version used in the above attacks contained a so-called HIVEMIND mode. – Launched in 2008, this campaign targeted the Church of Scientology for issuing a copyright violation against YouTube in an effort to have one of its videos removed. For an attack to succeed, thousands of users must coordinate and simultaneously direct traffic to the same network.LOIC has been used in a number of high profile DDoS attacks, including. However, a single LOIC user is unable to generate enough requests to significantly impact a target. JS LOIC-a JavaScript version of the application-and the web-based Low Orbit Web Cannon have also been released.DDoS perpetrators use LOIC to flood target systems with junk TCP, UDP and HTTP GET requests. ![]() What is Low Orbit Ion Cannon (LOIC)Low Orbit Ion Cannon (LOIC) is a widely available, open-source application developed by Praetox Technologies used for network stress testing, as well as and distributed denial of service (DDoS) attacks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |