Loic web version download
Please provide the ad click URL, if possible:. Oh no! Some styles failed to load. Help Create Join Login. Application Development. IT Management. Project Management. Resources Blog Articles. Menu Help Create Join Login. LOIC A network stress testing application. Download Malware Detected. Download at Own Risk.
Get project updates , sponsored content from our select partners, and more. Full Name. The popularity came about as it has a version by Anonymous with an IRC based control channel that allows people to join voluntary botnets and attack single targets often led by 4chan or Anonymous themselves.
The below version actually contains the Hivemind code too, you just need to launch it with the following option:. Note: It does NOT allow remote administration of your machine, or anything like that; it is literally just control of loic itself. Is LOIC a virus? There are 2 versions of the tool: the first is the binary version, which is the original LOIC tool.
The LOIC was originally developed by Praetox Technologies as a stress testing application before becoming available within the public domain. The only thing a user needs to know for using the tool is the URL of the target. A would-be hacker need only then select some easy options address of target system and method of attack and click a button to start the attack. The tool takes the URL of the target server on which you want to perform the attack.
You can also enter the IP address of the target system. The IP address of the target is used in place of an internal local network where DNS is not being used. You can select the method of attack on the target server. See the basic screen of the tool in the snapshot above in Figure 1.
This allowed the tool to be remotely controlled, using the IRC protocol. In that case, the user machine became part of a botnet. The bigger the botnet, the more powerful the attack is. All three methods implement the same mechanism of attack.
This tool continues sending requests to the target server; after some time, the target server becomes overloaded. In this way, the target server will no longer be able to respond to requests from legitimate users, effectively shutting it down. It has port 80 as the default option selected, but you can change this according to your need.
Change the message string or leave it as the default. Select the type of attack as TCP to use this. A web application firewall can detect this type of attack easily. After starting the attack you will see some numbers in the Attack status fields. You can also give the UDP attack a try.
Users can also set the speed of the attack by the slider. It is set to faster as default but you can slow down it with the slider. With this, users can connect their client to an IRC server. In this way, it can be controlled remotely, thus facilitating some risky attacks, so use this wisely. But connecting to an IRC server will not allow a remote administration of your machine or any other risks to your system: it will only control your LOIC client.
This method was used to collect more people in the DDOS attack against Visa, Mastercard, and other financial organizations that supported Wikileaks. In this mode, thousands of system attacks on a single website to made a real impact. The more people that joined the attack via IRC, the more powerful the attack became.
You can also set more parameters in the command to use the tool in better way. Use port and channel too with the command. This web- based tool runs only on JavaScript-enabled web browsers. This is easier to use than the desktop version. Just visit the web page with a single HTML file and start the attack.
The attack power of this version is same as from the desktop. This tool does not take any precautions to hide IP address of the origin of the attack. Attacks generated by this tool are simple and expose the IP address of attacker in each request packet sent to victim server to flood the request queue. If you are thinking that we can use proxies to solve this problem, you are wrong.
Attackers cannot use proxies in these attacks because your requests will hit the proxy server, not the target server. So you will not be able to launch a DOS attack on the server effectively while using a proxy. But some analysts say that this can be used with a proxy server if the proxy is robust enough. According to them, all your request packets will be forwarded to the server system by proxy at the end.
LOIC is available for free to download and use, and can be used effectively with very little hacking experience. Anyone that wants to can attack a website with this tool. As discussed above, the attack of this tool is simple and easy to identify. A well-configured firewall is enough to prevent the attack from being fully effective. And a server administrator can see the request logs to identify the IP and block the IP from the server. Every website owner or server administrators should monitor the traffic and all the activities being performed on the server.
This can help well enough against the attack. But this will not help you when a network of LOIC clients will fire on the server system all at once.
0コメント