Skip to content
Surf Wiki
Save to docs
general/denial-of-service-attacks

From Surf Wiki (app.surf) — the open knowledge base

Low Orbit Ion Cannon

Network testing and denial-of-service app

Low Orbit Ion Cannon

Network testing and denial-of-service app

FieldValue
titleLow Orbit Ion Cannon
nameLOIC
screenshotFile:LOIC-0.png
authorPraetox Technologies
latest release version1.0.8
latest release date
latest preview date
discontinuedyes
programming languageC#
operating systemWindows, Linux, OS X, Android, iOS
platform.NET, Mono
size131 KB
languageEnglish
genreNetwork testing
licensePublic domain

Low Orbit Ion Cannon (LOIC) is an open-source network stress testing and denial-of-service attack application written in C#. LOIC was initially developed by Praetox Technologies; however, it was later released into the public domain and is currently available on various open-source platforms.

Characteristics

LOIC performs a DoS attack (or, when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP, UDP, or HTTP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.

The software inspired an independent JavaScript version called JS LOIC in addition to a LOIC-derived web version called Low Orbit Web Cannon. These enable a DoS from a web browser.

Countermeasures

Security experts quoted by the BBC indicated that well-written firewall rules can filter out most traffic from DDoS attacks by LOIC, thus preventing the attacks from being fully effective. In at least one instance, filtering out all UDP and ICMP traffic blocked a LOIC attack. Firewall rules of this sort are more likely to be effective when implemented at a point upstream of an application server's Internet uplink to avoid the uplink from exceeding its capacity.

LOIC attacks are easily identified in system logs, and the attack can be tracked down to the IP addresses used.

Usage

A screenshot of LOWC (Low Orbit Web Cannon) running in a web browser.

LOIC was used by Anonymous (a group that spawned from the /b/ board of 4chan) during Project Chanology to attack websites from the Church of Scientology, once more to (successfully) attack the Recording Industry Association of America's website in October 2010, and it was again used by Anonymous during their Operation Payback in December 2010 to attack the websites of companies and organizations that opposed WikiLeaks.

In retaliation for the shutdown of the file sharing service Megaupload and the arrest of four workers, members of Anonymous launched a DDoS attack upon the websites of Universal Music Group (the company responsible for the lawsuit against Megaupload), the United States Department of Justice, the United States Copyright Office, the Federal Bureau of Investigation, the MPAA, Warner Music Group and the RIAA, as well as the HADOPI, all on the afternoon of January 19, 2012, through LOIC. In general, the attack hoped to retaliate against those who Anonymous members believed harmed their digital freedoms.

Origin of name

The LOIC application is named after the ion cannon, a fictional weapon from many sci-fi works, video games, and in particular after its namesake from the Command & Conquer series. The artwork used in the application was a concept art for Command & Conquer 3: Tiberium Wars.

References

References

  1. [https://sourceforge.net/projects/ddos-ip-attack-stress-loic/ SourceForge]
  2. "Praetox Technologies".
  3. "LOIC | Free Security & Utilities software downloads at". Sourceforge.net.
  4. "NewEraCracker/LOIC · GitHub". Github.com.
  5. (9 December 2010). "Pro-Wikileaks activists abandon Amazon cyber attack". BBC News.
  6. Warren, Christina. (December 9, 2010). "How Operation Payback Executes Its Attacks". [[Mashable]].
  7. "Command & Conquer FAQ/Walkthrough for Nintendo 64 by DTran - GameFAQs".
  8. (1 August 2014). "Cyberwarfare". Jones & Bartlett Publishers.
  9. (10 December 2010). "Anonymous Wikileaks supporters explain web attacks". BBC.
  10. (2001-02-06). "The attacks on GRC.COM". GRC.com.
  11. Nardi, Tom. (March 3, 2012). "Low Orbit Ion Cannon: Exposed". The Powerbase.
  12. Hachman, Mark. (October 29, 2010). "'Anonymous' DDoS Attack Takes Down RIAA Site". [[PC Magazine]].
  13. Moses, Asher. (December 9, 2010). "The Aussie who blitzed Visa, MasterCard and PayPal with the Low Orbit Ion Cannon". [[The Age]].
  14. (December 10, 2010). "Anonymous Wikileaks supporters mull change in tactics". [[BBC News]].
  15. "Anonymous Hackers Hit DOJ, FBI, Universal Music, MPAA And RIAA After MegaUpload Takedown". Forbes.
  16. "THE INFORMATION DEFENSE INDUSTRY AND THE CULTURE OF NETWORKS - Amodern". Amodern.
  17. Homeworld, Homeworld 2, Unreal Tournament 2004, Ogame, Ratchet & Clank: Up Your Arsenal, StarCraft
  18. metatags generator. (2012-09-27). "Low Orbit Ion Cannon".
Info: Wikipedia Source

This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.

Want to explore this topic further?

Ask Mako anything about Low Orbit Ion Cannon — get instant answers, deeper analysis, and related topics.

Research with Mako

Free with your Surf account

Content sourced from Wikipedia, available under CC BY-SA 4.0.

This content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.

Report