Jump to content

Low Orbit Ion Cannon: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
→‎See also: fixing red link
Adding Links for Javascript LOIC
Line 45: Line 45:
* [http://github.com/NewEraCracker/LOIC/ LOIC project development and downloads at GitHub]
* [http://github.com/NewEraCracker/LOIC/ LOIC project development and downloads at GitHub]
* [http://www.nytimes.com/2011/06/11/technology/11hack.html Sony Hackers Use LOIC at NYTimes]
* [http://www.nytimes.com/2011/06/11/technology/11hack.html Sony Hackers Use LOIC at NYTimes]
* [http://www.http://loic.webs.com/ A Mirror of the Original Javascript LOIC Site]
* [http://www.joebaptista.com/attack-tool/index.html Original Javascript LOIC Site (down)]


[[Category:Denial-of-service attacks]]
[[Category:Denial-of-service attacks]]

Revision as of 00:53, 6 December 2011

LOIC
Written inC# Python (programming language)
Operating systemWindows, Linux, Mac OS X
Platform.NET, Mono
SizeAbout 100 KB
Available inEnglish French
TypeNetwork testing
LicensePublic domain Open Source
WebsiteLOIC at SourceForge; LOIC at GitHub

LOIC (Low Orbit Ion Cannon) is an open source network stress testing application, written in C#. A JavaScript version has also been created enabling a DoS from a web browser and also a Qt edition called loiq written in C++ exists.[1][2] LOIC was initially developed by Praetox Technologies, but later it was released into the public domain.[3]

LOIC named after a fictional weapon in the Command & Conquer series of video games. The Ion Cannon was first popularized in the original Star Wars movies. Ion Cannons were used for orbital defense against low orbit Star Destroyers on Hoth in The Empire Strikes back.[4]

Use

LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP packets or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.[5]

Countermeasures

Security experts quoted by the BBC indicated that well-written firewall rules can filter out most traffic from DDoS attacks by LOIC, thus preventing the attacks from being fully effective.[6]

Notable uses

LOIC was utilized by Project Chanology, an offshoot of the Anonymous group, to attack websites from the Church of Scientology websites, then by Anonymous itself to successfully attack the Recording Industry Association of America's website in October 2010,[7], and again during Operation Payback in December 2010 to attack the websites of companies and organizations that opposed WikiLeaks.[8][9] LOIC was utilized by many attackers, despite the fact that a network firewall could easily filter out network traffic it generates, thus rendering it only partly effective.[6]

More than 30,000 downloads of the tool were reported to have occurred between 8 and 10 December 2010.[10] If an attack is not routed through an anonymization network such as Tor, traceable IP address records can be logged by its recipient.[11] This can be used to identify the individual user conducting DDoS attacks from logs kept by their ISPs. On January 27, 2011, five people were arrested in the UK in connection with the Operation Payback attacks,[12] while in June 2011 a further three LOIC users were arrested in Spain for their involvement in the web attacks.[13] On 14 June 2011, it was reported that Turkish police arrested 32 individuals who allegedly attacked government websites in protest against the introduction of state level web filtering. The individuals are thought to be members of Anonymous that used the LOIC tool in their protest. [14].

See also

References

  1. ^ "loiq on SourceForge".
  2. ^ Warren, Christina (December 9, 2010). "How Operation Payback Executes Its Attacks". Mashable.
  3. ^ http://praetox.com/n.php/sw/sauce
  4. ^ Paul Mutton (8 December 2010). "MasterCard attacked by voluntary botnet after WikiLeaks decision". Netcraft. Retrieved 12 December 2010.
  5. ^ "Pro-Wikileaks activists abandon Amazon cyber attack". BBC News. 9 December 2010.
  6. ^ a b "Anonymous Wikileaks supporters explain web attacks". BBC. 10 December 2010. Retrieved 11 December 2010.
  7. ^ Hachman, Mark (October 29, 2010). "'Anonymous' DDoS Attack Takes Down RIAA Site". PC Magazine.
  8. ^ Moses, Asher (December 9, 2010). "The Aussie who blitzed Visa, MasterCard and PayPal with the Low Orbit Ion Cannon". The Age. Melbourne.
  9. ^ "Anonymous Wikileaks supporters mull change in tactics". BBC News. December 10, 2010.
  10. ^ John E Dunn (10 December 2010). "Wikileaks DDoS tool downloads grow rapidly". Network World. Retrieved 11 December 2010.
  11. ^ Aiko Pras, Anna Sperotto, Giovane C. M. Moura, Idilio Drago, Rafael Barbosa, Ramin Sadre, Ricardo Schmidt and Rick Hofstede (10 December 2010). "Attacks by "Anonymous" WikiLeaks Proponents not Anonymous" (PDF). CTIT Technical Report 10.41. University of Twente. Retrieved 12 December 2010.{{cite web}}: CS1 maint: multiple names: authors list (link)
  12. ^ "Five arrested over 'Anonymous' web attacks". BBC News. 27 January 2011. Retrieved 30 January 2011.
  13. ^ Spain arrests Anonymous suspects - BBC News, 10 June 2011. "It seems that LOIC did a poor job of hiding the identity of the people using it. It is believed that some police forces have already moved against the group based on this information. "
  14. ^ BBC News. 14 June 2011 http://www.bbc.co.uk/news/technology-13762626. {{cite news}}: Missing or empty |title= (help); Text "Anonymous members arrested in Turkey" ignored (help)