![]() ![]() LOIC cannot use proxies, so the IP address of the user is clearly visible to the target (stored in logs).Ī single person using LOIC has very little impact but the application may run in hivemind mode. ![]() Attackers use it to flood the target with bogus network traffic so that it has no resources to serve legitimate requests. It sends a stream of TCP packets, UDP packets, or HTTP GET packets to a selected host ur URL. ![]() The name comes from a fictional weapon used in a video game. The successor of LOIC is called the High Orbit Ion Cannon (HOIC). There is also a JavaScript version (JS LOIC) that can be embedded in a page and a web application that only requires the user to open the web browser (Low Orbit Web Cannon). The LOIC is available for Windows, Linux, OS X, Android, and iOS. ![]() This application is available as open source on and often used by malicious parties for DoS (denial of service) and DDoS (distributed denial of service) attacks. The Low Orbit Ion Cannon (LOIC) is a tool that was developed by Praetox Technologies as a network stress testing application and then released into the public domain. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |