LOIC (Low Orbit Ion Cannon) � DOS attacking tool


2

Image
Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain, and now is hosted on several open source platforms.

The software has inspired the creation of an independent JavaScript version called JS LOIC, as well as LOIC-derived web version called Low Orbit Web Cannon. These enable a DoS from a web browser.

LOIC basically turns your computer’s network connection into a firehose of garbage requests, directed towards a target web server. On its own, one computer rarely generates enough TCP, UDP, or HTTP requests at once to overwhelm a web servergarbage requests can easily ignored while legit requests for web pages are responded to as normal.
But when thousands of users run LOIC at once, the wave of requests become overwhelming, often shutting a web server (or one of its connected machines, like a database server) down completely, or preventing legitimate requests from being answered.

Tutorial :
1. Download the software and execute it. lets describe it with a screenshot!
Image
2. Enter the URL which u wanna attack and click on Lock On.
3.The ip address of that very site will get displayed in the “Selected target” caption. Write this ip address in ip bar as shown above and click Lock On.
4. Select the method and number of threads.
5. Click on IMMA CHARGIN MAH LAZER…
Cheers You’re done……….
http://www.mediafire.com/?ctg8c3186mimqx7

39replies
14voices
2,895views
2images
Alien [StRe1cHeR]
11 years ago

0

thank you for share.


3

Fuck that! Just bring it down to backtrack/kali…. Unless you have a mass of attackers using LOIC not much is going to happen and firewalls/tunnels that can filter your attacks. You’re better off building your own attack and actually learning something without using software.

But– Note the speed of a 3G cell phone ;) if you get the LOIC app for android you can take down a single users pc (I don’t know about a server that’s been put together well and prepared for these attacks though) from approximately 1958 miles within an estimation of 2-4 minutes by yourself. I know this from experience.

Here’s the link from android (free @ Google playstore): https://play.google.com/store/apps/details?id=genius.mohammad.loic&hl=en

Use HTTP for the reasons that the packet size can get pretty hefty and run around 600-750 threads no more using the fastest setting (slider all the way to the left). The app will more than likely crash if you exceed 600-750. When I used it was stable around there but any higher dead. I took a pretty good analysis of these tools too since the whole purpose was to show my friend how to perform a Denial of Service Attack.

But as I said before, what are you really learning from using someone else software? That just makes you a script kiddie. I mean yeah you’re using others software by using software at Linux hacking software, such as metasploit and other tools, but you’re still getting familiar with using command line interface. While you’re at it look into some good proxies and pick up a programming language/ Here’s another glass of water http://www.codecademy.com/ . Python is a pretty easy start an compatible with most Linux distributions. Step1: Create your script… Step 2: Put it in an organized folder Step 3: Run it.. example>
cd /python_scripts/hacks/
[ENTER]
python myhackingscript.py
[ENTER]
Boom!!! :P

Anywho' I’m going on lol but just saying I’d rather use windows to perform a ddos attack on command shell than LOIC. Just because hacking with GUI requires no skill or knowledge whatsoever! If you want to become a successful hack… Become an information junky don’t half fast it that’s how you get caught. How do you know you can trust someone else’s code and that they aren’t logging in your computer and on their servers, every time you use their software? Think about it….

Not saying LOIC isn’t a clever tool but, it’s kind of obsolete, weak, and noobish….

Here’s pretty much speech of every Denial of Service attack possible @ Defcon ( <3 ), and has some stuff about anonymous and Lulzsec if you’re interested. Pretty much teaches how and what’s going on here.

Anyways!

Cheers!!!

[deleted user]
11 years ago

1

Nice post mate (:
Im no fan of LOIC!
I’m actually still a noob myself.
I use Kali Linux because i love Linux and because i love the tools they provide, helps me on the way!
i’m no programmer so im grateful for all the programmers out there, im kind of a script kiddie yes, but why make Kali linux if not to be used by us :b
I never act as if im better than anyone else because that wont help me nor the person im helping (:
so thanks for sharing, i’ll say ( :/ to LOIC, :) to the POST ) !
Have fun !


1

Ha ha thanks for the reply and Not saying it’s a bad tool just very obsolete and not much to learn from pushing a couple buttons. lol I mean it serves its purpose of gathering a couple hundred people who hate Scientology together and flooding their networks with data, yeah, but to call yourself a hacker you have to have a little more up your sleeve than just LOIC… cause I mean when your attack fails there’s a million other options but, unless you have a back up plan on what those options are and some knowledge it’s no use. So if you know other types of denial of service attacks then yeah go for it! Serves your purpose as an activist/hacktivist. But hacking usually refers to accessing data/information in unconventional ways. So I don’t get that out of a denial of service of service attack. Plus DOS/DDOS attacks tend to be risky y ‘know. Your ip info is present, information of your system being distributed back and forth, creating somewhat of a connection I guess in a weird way. Just it’s simple to track…. If you want to take down a companies website, play like a ransom. Use your crafty/creative hacker skills to gain access to the server, create a backdoor, make a back up of the the site and databases, once all that good kidnapping stuff is down, lock up all connections to the server (again use crafty hacker skills: crash the server, plant a smart virus, redirect, deface, a back door with a shell running, etc.) and finally delete all of your logs. Security precautions and a plan on how to execute your attack should be done before hand though y 'know?! So Idk I think that’s more efficient I guess than a ddos. Spend some extra time and don’t get busted why not lol. I can’t really think of anything because, I do not have any big companies I’m after right now ha ha!

Now, being a script kiddie and using other line user interface tools? I wouldn’t really say that’s being a script kiddie. I mean depends on the extent you go to… Like if your using something that requires a lot of custom input and data that you’re retrieving on your own such as, net work maps, port scanning, database injection scanning, etc. and then inputting it in the software? Then “I” at least wouldn’t say that would be a script kiddie. Other, very “advanced” / egotistical people would beg to differ but y ‘know what… I’m not them! Now if you’re using a lot of button click / gui based stuff that’s like, “Enter Ip address… Okay hacking… loading…. hacked! Would you now like to see their screen? y o n? okay loading screen shot” then yeah I would or if it’s something simple like armitage then yeah…. script kiddie all the way. But, don’t condemn the script kiddies because, they’re learning y 'know and we all start somewhere right?

Picking up Python is fairly easy since it’s plain English but it’s different in a weird way and idk how to explain check it out for yourself. Imagine if command line made a baby with a standard programming language. That’s what you would get I guess :/ there’s so much on codeacademy though seriously check it out. Backtrack was fun and had some cool linux stuff I’m not going into but the consistency with Kali and the stability is excellent unless you’re running from a usb then, the network drivers tend to give out. But that’s also when it was new, I’ll have to check back in, maybe see if KDE is in yet all they had was GNOME last.

Anyways thanks for responding to my post. I was hoping at least somebody would lol

Cheers!

[deleted user]
11 years ago

0

Thanks for your big and awesome reply ;) !
This made me think a bit more hehe, i still call myself a script kiddie because im just not that good yet, i now go at a education where when im done i can call myself a Data Technician with the speciality of Infrastructure, i learn a lot about networks and operating systems, but hey there is also some programming of course, im glad to finally join in on an education i like and im happy that i still got this lovely community to fall back to, coes the more i learn from this education the more i can use it in the dark world of hacking, Dark world is depending on what you do, i mostly sit in a dark room with some headphones on if im trying to get access to something gives me a clear mind only focusing on what the hell im doing :b
but i came to this site hoping to learn and so far i learned a lot, even from this reply of yours i learn small things or at least my memory is being refreshed :)

Thanks for the reply mate.

Peace - Th3FjonG

loltac
11 years ago

0

Just on the topic of Script Kiddies, I know I’m new here, but that codeacademy website is great! I’m doing HTML and Javascript, and will be starting PHP when I finish HTML (around 60%). I use the metasploit command interface as I want to see the different options better, and its easier for me to understand (and I can’t afford all this ‘auto select exploit’ stuff on the Web GUI!). But i’m starting off with it, and if yo have any experience with metasploit could you please check my post in the Tools & Utilities forum, i’m sort of stuck with metasploit, and google isn’t going anywhere… Thanks! (Sorry to Mods for deviating…)

loltac
11 years ago

0

@MaxLockhart Cheers for that DOS attack presentation on youtube!

Max Lockhart [MaxLockhart]
11 years ago | edited 11 years ago

0

Haha you’re welcome @loltac you gotta get down to the real business lol

loltac
11 years ago

0

Forwarded to my mate, he loved it as well! ICT teacher wasn’t happy when we were talking about the best way to bring down the school website… Th3J3st3r style with Slowloris/mobile? :) or attempt an Iv6 attack? Unfortunately our school systems aren’t running it… Those evil eyes haha


0

Haha nice! Who cares?! What you guys do on your time is your business lol. I personally am not a fan of Denial of Service attacks. They’re pretty loud and you’re just asking to be caught.

loltac
11 years ago

0

Oh i’m not gonna do one :) the trace of LOIC is so obvious, however you should definitely take a look at what is known on XerXes !


0

Yeah that’s the tool the Jester created and used against the wiki leak website

[paulau]
11 years ago

0

LOIC is useless…
Must be 300000 or dont work…


0

Actually don’t underestimate the power of using LOIC with the power of a 4g cell phone. Brought my mates, clear accross the country, internet down in 5 minutes. 2 minutes his connection slowed down, 5 minutes– connections timed out. It was fantastic… via computer though it doesn’t really do anything at all. Using a cell phone be careful though. I have a really shitty android phone so, I could only go up to about 720-1000 or so threads before my the app would crash. Any higher my phone would reset. I still have it installed as a last resort tool y ‘know but I will never use it. As I said I do not care for denial of service attacks.

Also you have to keep in mind. How many servers do they have up? How are they tunneling that traffic. You may want to attack the dns servers instead to keep the server access down all around the world. For Example… nslookup facebook.com
Here in America I get 173.252.xxx.xx but in the UK you may get something entirely different. Who knows? If you look it up for me and post the results here to enlighten me that would be great.
btw Love that meme you have there. Haha it’s hilarious. Anywho, if let’s say we attack a low budget website with only 1 server up then the sites going to drop like a rock. It’s all about the money and resources you have to keep your security. Well except for us hackers who can build our own tools, devices, and set up our own security, test it a shit load of times until it’s perfected and yeah.

@paulau @loltac

loltac
11 years ago

0

@Paulau I can vouch for LOIC, i’ve seen a small website taken down by one person! However, its demanding on the computer and more obvious to see as it sends so pany packets, whereas SlowLoris sends incomplete packets which tie up the port for much longer, reducing strain on the computer… Its also better for phones, they’ve even got an app! Heck…
@MaxLockhart That DoS presentation on youtue you linked summed it up generally…
LOIC = lots of people one site down
Slowloris= one person multiple sites down…
Generally!!!


0

Pretty Much… still DDOS attacks are inferior and take no skill. Effective– but, dishonorable!

loltac
11 years ago

0

Any advice on where to go for presentations of website takedown? Just presentations or practice websites (like this one!)


0

huh? @loltac

loltac
11 years ago

0

Hmm…. Like that youtube lecture, but instea of DOSing, for website takedown?


0

Do you mean website deface? @loltac

loltac
11 years ago

0

Well yes, topics like that… Just procrasination like :) but deface/take down/data taking (rfi/lfi/sql)?

aqua-squad
10 years ago

0

can if boot like ip off to

loltac
10 years ago

0

@aqua-squad I don’t understand you? If you mean will it show a websites IP, yes. If it will take the website down, most of the time no. No point trying to extort google haha.

aqua-squad
10 years ago

0

I mean like a local IP like a router ip

loltac
10 years ago

0

As in a 192… IP address? Hmmm, someone more experienced would need to tell you, but my first thought would be that unless it’s a server no…

aqua-squad
10 years ago

0

Do u know anyone that could maybe help.me.then

loltac
10 years ago

0

@FlabbyRabbit @Angellomichel387 …. Is it a server you’re trying to take down, or a computer on the same network as you?

Parris
10 years ago | edited 10 years ago

0

Technically wouldn’t that mean the tool would be a DoSer? Seeing as to qualify for you ddoseing application there needs to be be more than one computer. A bot net or server or something.

loltac
10 years ago

0

Meh, depends how technical you want to get… There are tools that take your individual packets and send them through a network of computers, then onto the server. I know that could be called a bot net, but if it’s a Tor style network, or you hijacked Tor itself then you could make it a DDoS.

aqua-squad
10 years ago

0

Well take down a server and a page but manly a server

aqua-squad
10 years ago

0

the kind of software would i need to take down a server

aqua-squad
10 years ago

0

and the link for the LOIC dose not work

tsopanarav3
10 years ago

0

http://sourceforge.net/projects/javaloic/?source=directory
here is a link for the Loic Good luck ;)

deafrascal
10 years ago

0

Hey Guys, I am new to this. Could you guys let me know if there is any debian (Kali) version of this tool.

Thank you :)


0

@deafrascal Just download the windows version and use it through wine…

deafrascal
10 years ago

0

Thanks, got little hiccup with wine, but worked well. Thanks again :)

Reply has been removed
Anonshadow
10 years ago | edited 10 years ago

0

Maxlochhart TY For Shareing dat app for android, and I never heard of loic till I looked at this post very curious now.

Reply has been removed
aqua-squad
10 years ago

-1

Can someone help me set up a IRC

Fireshard
10 years ago

0

@aqua-squad Please open up a new thread for this. Although, I suggest you just check out the guys on HT IRC. I think some of them can help you out!

Reply has been removed
Discussion thread has been locked. You can no longer add new posts.
1 of 40

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.

Dismiss