All three methods implement the same mechanism of attack. Type of attacks: As I’d mentioned previously, the LOIC uses three different types of attacks (TCP, UDP and HTTP). The bigger the botnet, the more powerful the attack is.įigure 2: Modified version of LOIC with an option for IRC connect A botnet is a system of compromised computer systems connected to each other via the internet, which are in turn controlled by the attacker who directs the malware toward his / her target. In that case, the user machine became part of a botnet. This allowed the tool to be remotely controlled, using the IRC protocol. It had an option to connect the client to the IRC (Internet Relay Chat). The LOIC version used by Anonymous group attacks was different than the original LOIC. See the basic screen of the tool in the snapshot above in Figure 1. Some other options include timeout, TCP/UDP message, Port and threads.
You can select the method of attack on the target server. The tool has three chief methods of attack: TCP, UDP and HTTP. The IP address of the target is used in place of an internal local network where DNS is not being used. You can also enter the IP address of the target system. The tool takes the URL of the target server on which you want to perform the attack. A would-be hacker need only then select some easy options (address of target system and method of attack) and click a button to start the attack. The only thing a user needs to know for using the tool is the URL of the target. It’s a very easy tool to use, even by those lacking any basic knowledge of hacking. The tool is able to perform a simple dos attack by sending a large sequence of UDP, TCP or HTTP requests to the target server. The LOIC was originally developed by Praetox Technologies as a stress testing application before becoming available within the public domain. This tutorial is only for educational purpose i am not responsible for any damage caused by this tutorial. This tutorial is written by M Yahya Ahmed(creator of this blog).