
- #Loic windows how to
- #Loic windows for android
- #Loic windows android
- #Loic windows software
- #Loic windows windows
#Loic windows windows
example>Īnywho' I’m going on lol but just saying I’d rather use windows to perform a ddos attack on command shell than LOIC. Step1: Create your script… Step 2: Put it in an organized folder Step 3: Run it.

Python is a pretty easy start an compatible with most Linux distributions. While you’re at it look into some good proxies and pick up a programming language/ Here’s another glass of water.

#Loic windows software
I mean yeah you’re using others software by using software at Linux hacking software, such as metasploit and other tools, but you’re still getting familiar with using command line interface.
#Loic windows how to
I took a pretty good analysis of these tools too since the whole purpose was to show my friend how to perform a Denial of Service Attack.īut as I said before, what are you really learning from using someone else software? That just makes you a script kiddie. When I used it was stable around there but any higher dead. The app will more than likely crash if you exceed 600-750. Use HTTP for the reasons that the packet size can get pretty hefty and run around 600-750 threads no more using the fastest setting (slider all the way to the left).
#Loic windows android
Here’s the link from android (free Google playstore):
#Loic windows for android
You’re better off building your own attack and actually learning something without using software.īut– Note the speed of a 3G cell phone ) if you get the LOIC app for android you can take down a single users pc (I don’t know about a server that’s been put together well and prepared for these attacks though) from approximately 1958 miles within an estimation of 2-4 minutes by yourself. Unless you have a mass of attackers using LOIC not much is going to happen and firewalls/tunnels that can filter your attacks. Select the method and number of threads.įuck that! Just bring it down to backtrack/kali…. Write this ip address in ip bar as shown above and click Lock On.Ĥ. Enter the URL which u wanna attack and click on Lock On.ģ.The ip address of that very site will get displayed in the “Selected target” caption. On its own, one computer rarely generates enough TCP, UDP, or HTTP requests at once to overwhelm a web servergarbage requests can easily ignored while legit requests for web pages are responded to as normal.īut when thousands of users run LOIC at once, the wave of requests become overwhelming, often shutting a web server (or one of its connected machines, like a database server) down completely, or preventing legitimate requests from being answered.ġ. LOIC basically turns your computer’s network connection into a firehose of garbage requests, directed towards a target web server. The software has inspired the creation of an independent JavaScript version called JS LOIC, as well as LOIC-derived web version called Low Orbit Web Cannon. LOIC was initially developed by Praetox Technologies, but was later released into the public domain, and now is hosted on several open source platforms.


In saying all that, if you were to pen test am individual at a home PC the bandwidth needed will not be as much.Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. One such amplification technique called DNS reflection. Since renting a large botnet can be expensive and unwieldy, attackers typically look for additional ways to amplify the size of their attacks, To launch a 65Gbps attack for example you’d need a botnet with at least 65,000 compromised machines each capable of sending 1Mbps of upstream data. What makes ddos so cool or scary in first understanding the attack bu useing usch binaries of HOIC is the fact that one can designate a target and click a button and then witness the TTL dwindle to a stop….though that’s just not going to happen with an average home PC using fiber and one instance of HOIC….įor example… To impact a somewhat important companies infrastructure the attack will need at least 65GB or higher… just to make an impact if at all any impact at all, depends on a few things such as mitigations (e.g CloudFlare) It is highly unlikely that the attacker has a single machine with a big enough Internet connection to generate that much traffic on its own.
