![]() This can consume web server resources or bandwidth. HTTP FloodĪn HTTP flood sends continual HTTP GET or POST requests to specific URLs on the target website. In a UDP flood, LOIC sends a stream of UDP packets to random destination ports on the target. This can overwhelm networks and load balancers. The exact working mechanism depends on the protocol used: TCP FloodĪ TCP flood attack establishes multiple half-open connections that consume resources on the target server waiting to complete the handshake. LOIC works by sending a high volume of TCP, UDP, or HTTP requests to the target server. The tool is popular among hackers as well as activist groups like Anonymous who have coordinated LOIC attacks for political reasons. User-friendly GUI and command-line interfacesĪttackers commonly use LOIC to carry out DoS attacks against websites, applications, and networks.Built-in support for orchestrating attacks via IRC channels.Optional encryption via ZOMBIE messages.Supports UDP, TCP, and HTTP flooding attacks.Allows users to control rate and duration of attack. ![]() Open-source tool available for Windows and Linux.This can overwhelm the server’s resources like CPU, memory, and bandwidth – resulting in slow response or unavailability for legitimate users. LOIC performs a DoS attack by flooding the target with TCP, UDP, or HTTP requests. Attackers can use LOIC to flood networks and websites with traffic, often as part of coordinated Distributed Denial of Service (DDoS) attacks. Low Orbit Ion Cannon (LOIC) is a popular open-source network stress testing and denial-of-service (DoS) attack tool.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |