Jump to content

Low Orbit Ion Cannon

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 45.43.101.69 (talk) at 16:22, 31 May 2016 (→‎Countermeasures). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Low Orbit Ion Cannon
Original author(s)Praetox Technologies
Stable release
1.0.8 / December 13, 2014; 9 years ago (2014-12-13)[1]
Written inC#
Operating systemWindows, Linux, Mac OS X, Android
Platform.NET, Mono
Size131 KB
Available inEnglish
TypeNetwork testing
LicensePublic domain

Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain,[2] and now is hosted on several open source platforms.[3][4]

Use

LOIC performs a DoS attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.[5]

The software inspired the creation of an independent JavaScript version called JS LOIC, as well as LOIC-derived web version called Low Orbit Web Cannon. These enable a DoS from a web browser.[6]

Countermeasures

Security experts quoted by the BBC indicated that well-written firewall rules can filter out most traffic from DDoS attacks by LOIC, thus preventing the attacks from being fully effective.[7] Specifically, it has been claimed that filtering out all UDP and ICMP traffic helps to effectively address LOIC attacks.[8] Because internet service providers provide less bandwidth to each of their customers in order to provide guaranteed service levels for all of their customers at once, firewall rules of this sort are more likely to be effective when implemented at a point upstream of an application server's internet uplink. In other words, it is easy to cause an ISP to drop traffic destined for a customer by sending a greater amount of traffic than is allowed on that customer's link, and any filtration that occurs on the customer side after the traffic traverses that link will not stop the service provider from dropping excess traffic destined for that customer.[8]

LOIC attacks are easily identified in system logs, and the attack can be tracked down to the IP addresses used at the attack.[9]

Notable uses

Project LOIC and 4chan

LOIC is the result of a brainstorming between hackers on 4chan in 2004, they sought to create a simple and efficient tool for a future cyberwar. Once the concept of simultaneous connection request architecture was set up it took few months to create it. Its existence became known much later to the public.[citation needed]

Project Chanology and Operation Payback

LOIC was used by 4chan during Project Chanology to attack websites from the Church of Scientology,[10] once more to (successfully) attack the Recording Industry Association of America's website in October 2010,[11] and again during Operation Payback in December 2010 to attack the websites of companies and organizations that opposed WikiLeaks.[12][13]

Operation Megaupload

In retaliation for the shut down of the file sharing service Megaupload and the arrest of four workers, Anonymous DDoSed the websites of UMG (the company responsible for the lawsuit against Megaupload), the United States Department of Justice, the United States Copyright Office, the Federal Bureau of Investigation, the MPAA, Warner Brothers Music and the RIAA, as well as the HADOPI, all on the afternoon of January 19, 2012, through LOIC.[14]

Origin of name

The LOIC application is named after the ion cannon, a fictional weapon from many sci-fi works, and in particular after its namesake from the Command & Conquer series of video games.[15]

See also

References

  1. ^ SourceForge: LOIC files
  2. ^ "Praetox Techlologies". Archived from the original on Oct 8, 2010.
  3. ^ "LOIC | Free Security & Utilities software downloads at". Sourceforge.net. Retrieved 2014-11-17.
  4. ^ "NewEraCracker/LOIC · GitHub". Github.com. Retrieved 2013-11-22.
  5. ^ "Pro-Wikileaks activists abandon Amazon cyber attack". BBC News. 9 December 2010.
  6. ^ Warren, Christina (December 9, 2010). "How Operation Payback Executes Its Attacks". Mashable.
  7. ^ "Anonymous Wikileaks supporters explain web attacks". BBC. 10 December 2010. Retrieved 11 December 2010.
  8. ^ a b "The attacks on GRC.COM" (PDF). GRC.com. 2001-02-06. Retrieved 2012-01-25.
  9. ^ Nardi, Tom (March 3, 2012). "Low Orbit Ion Cannon: Exposed". The Powerbase. Retrieved March 4, 2012.
  10. ^ Norton, Quinn (2012-01-01). "Anonymous 101 Part Deux: Morals Triumph Over Lulz". Wired.com. Retrieved 2013-11-22.
  11. ^ Hachman, Mark (October 29, 2010). "'Anonymous' DDoS Attack Takes Down RIAA Site". PC Magazine.
  12. ^ Moses, Asher (December 9, 2010). "The Aussie who blitzed Visa, MasterCard and PayPal with the Low Orbit Ion Cannon". The Age. Melbourne.
  13. ^ "Anonymous Wikileaks supporters mull change in tactics". BBC News. December 10, 2010.
  14. ^ "Anonymous Hackers Hit DOJ, FBI, Universal Music, MPAA And RIAA After MegaUpload Takedown". Forbes. Retrieved 2013-11-22.
  15. ^ metatags generator (2012-09-27). "Low Orbit Ion Cannon". Web.archive.org. Archived from the original on September 27, 2012. Retrieved 2013-11-22. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)

External links