Low Orbit Ion Cannon: Difference between revisions
No edit summary |
→Operation Phobos-Gone: find a reliable source, otherwise this breaks WP:RS |
||
Line 39: | Line 39: | ||
{{main|Timeline of events involving Anonymous#Operation Megaupload|Megaupload#Retaliatory attacks by Anonymous|l1=Operation Megaupload|l2=Megaupload}} |
{{main|Timeline of events involving Anonymous#Operation Megaupload|Megaupload#Retaliatory attacks by Anonymous|l1=Operation Megaupload|l2=Megaupload}} |
||
In retaliation for the shut down of the file sharing service Megaupload and the arrest of four workers, Anonymous DoSed the websites of UMG (the company responsible for the lawsuit against Megaupload), the United States Department of Justice, the United States Copyright Office, the Federal Bureau of Investigation, the MPAA, Warner Brothers Music and the RIAA, as well as the HADOPI, all on the afternoon of January 19, 2012, through LOIC. |
In retaliation for the shut down of the file sharing service Megaupload and the arrest of four workers, Anonymous DoSed the websites of UMG (the company responsible for the lawsuit against Megaupload), the United States Department of Justice, the United States Copyright Office, the Federal Bureau of Investigation, the MPAA, Warner Brothers Music and the RIAA, as well as the HADOPI, all on the afternoon of January 19, 2012, through LOIC. |
||
===Operation Phobos-Gone=== |
|||
Following the failure and eventual crash of Russia's most ambitious sample return spacecraft [[Fobos-Grunt]], Anonymous used LOIC to perform vigilante attacks on those responsible for the fiasco, based on the failure reports released. On May 10, Anonymous DoSed the project website of Fobos-Grunt on the web server of [[Russian Space Research Institute]].<ref>[http://pastebin.com/NB3VyyTB phobos.cosmos.ru Takedown notice]</ref> |
|||
==References== |
==References== |
Revision as of 18:30, 11 May 2012
This article needs attention from an expert in Internet. Please add a reason or a talk parameter to this template to explain the issue with the article.(December 2011) |
File:LoicNewEraCracker - from Commons.png | |
Original author(s) | Praetox Technologies |
---|---|
Written in | C# |
Operating system | Windows, Linux, Mac OS X |
Platform | .NET, Mono |
Size | 131 KB |
Available in | English |
Type | Network testing |
License | Public domain |
Website | LOIC at SourceForge |
Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain,[1] and now is hosted on several open source platforms.[2][3]
The software has inspired the creation of an independent JavaScript version called JS LOIC, as well as LOIC-derived web version called Low Orbit Web Cannon. These enable a DoS from a web browser.[4]
Use
LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP packets or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.[5]
Countermeasures
Security experts quoted by the BBC indicated that well-written firewall rules can filter out most traffic from DDoS attacks by LOIC, thus preventing the attacks from being fully effective.[6] Specifically, it has been claimed that filtering out all UDP and ICMP traffic helps to address LOIC attacks in an efficient way.[7] However, the firewall rules need to be entered upstream, e.g. at the ISP of the site operator, where the backbone is converted to the server's broadband line. If the packets still have to travel through the server's limited line, then filtering the packets at the firewall level is not a valid deterrence, since the packets still have to travel to the firewall before the firewall can do anything to the packets, and the line between the server's ISP and the server's firewall will be clogged. [7]
LOIC attacks are easily identified in system logs, and the attack can be tracked down to the individual users' IP addresses.[8]
Notable uses
Project Chanology and Operation Payback
LOIC was used by Project Chanology, a project by the Anonymous group, to attack websites from the Church of Scientology,[9] then by Anonymous itself to successfully attack the Recording Industry Association of America's website in October 2010,[10] and again during Operation Payback in December 2010 to attack the websites of companies and organizations that opposed WikiLeaks.[11][12]
Operation Megaupload
In retaliation for the shut down of the file sharing service Megaupload and the arrest of four workers, Anonymous DoSed the websites of UMG (the company responsible for the lawsuit against Megaupload), the United States Department of Justice, the United States Copyright Office, the Federal Bureau of Investigation, the MPAA, Warner Brothers Music and the RIAA, as well as the HADOPI, all on the afternoon of January 19, 2012, through LOIC.
References
- ^ http://web.archive.org/web/20101008215600/http://praetox.com/n.php
- ^ http://sourceforge.net/projects/loic/
- ^ http://github.com/NewEraCracker/LOIC/
- ^ Warren, Christina (December 9, 2010). "How Operation Payback Executes Its Attacks". Mashable.
- ^ "Pro-Wikileaks activists abandon Amazon cyber attack". BBC News. 9 December 2010.
- ^ "Anonymous Wikileaks supporters explain web attacks". BBC. 10 December 2010. Retrieved 11 December 2010.
- ^ a b "The attacks on GRC.COM" (PDF). GRC.com. 06-02-2001. Retrieved 25-01-2012.
{{cite web}}
: Check date values in:|accessdate=
and|date=
(help) - ^ Nardi, Tom (March 03, 2012). "Low Orbit Ion Cannon: Exposed". The Powerbase. Retrieved March 04, 2012.
{{cite web}}
: Check date values in:|accessdate=
and|date=
(help); Cite has empty unknown parameter:|1=
(help) - ^ Anonymous 101 Part Deux: Morals Triumph Over Lulz
- ^ Hachman, Mark (October 29, 2010). "'Anonymous' DDoS Attack Takes Down RIAA Site". PC Magazine.
- ^ Moses, Asher (December 9, 2010). "The Aussie who blitzed Visa, MasterCard and PayPal with the Low Orbit Ion Cannon". The Age. Melbourne.
- ^ "Anonymous Wikileaks supporters mull change in tactics". BBC News. December 10, 2010.