NewEraCracker LOIC GUI |
|
Original author(s) | Praetox Technologies |
---|---|
Written in | C# |
Operating system | Windows, Linux, Mac OS X |
Platform | .NET, Mono |
Size | 131 KB |
Available in | English |
Type | Network testing |
License | Public domain |
Website | LOIC at SourceForge; LOIC at GitHub |
Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but later it was released into the public domain.[1] LOIC named after a fictional weapon in the Command & Conquer series of video games.[2] The Ion Cannon was first popularized in the original Star Wars movies. Ion Cannons were used for orbital defense against low orbit Star Destroyers on Hoth in The Empire Strikes back.
The software has inspired the creation of an independent JavaScript version, enabling a DoS from a web browser.[3]
Contents |
LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP packets or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.[4]
Security experts quoted by the BBC indicated that well-written firewall rules can filter out most traffic from DDoS attacks by LOIC, thus preventing the attacks from being fully effective.[5]
LOIC was utilized by Project Chanology, an offshoot of the Anonymous group, to attack websites from the Church of Scientology, then by Anonymous itself to successfully attack the Recording Industry Association of America's website in October 2010,[6] and again during Operation Payback in December 2010 to attack the websites of companies and organizations that opposed WikiLeaks.[7][8] LOIC was utilized by many attackers, despite the fact that a network firewall could easily filter out network traffic it generates, thus rendering it only partly effective.[5]
More than 30,000 downloads of the tool were reported to have occurred between 8 and 10 December 2010.[9] If an attack is not routed through an anonymization network such as Tor, traceable IP address records can be logged by its recipient.[10] This can be used to identify the individual user conducting DDoS attacks from logs kept by their ISPs. On January 27, 2011, five people were arrested in the UK in connection with the Operation Payback attacks,[11] while in June 2011 a further three LOIC users were arrested in Spain for their involvement in the web attacks.[12] On 14 June 2011, it was reported that Turkish police arrested 32 individuals who allegedly attacked government websites in protest against the introduction of state level web filtering. The individuals are thought to be members of Anonymous that used the LOIC tool in their protest.[13]