Difference between revisions of "Low Orbit Ion Cannon"
(→The GUI) |
|||
Line 26: | Line 26: | ||
# "Select your target" | # "Select your target" | ||
#* '''Url''' - (''Uniform Resource Locator'') The name (reference) of the website you want to target.<ref>https://docs.oracle.com/javase/tutorial/networking/urls/definition.html</ref> | #* '''Url''' - (''Uniform Resource Locator'') The name (reference) of the website you want to target.<ref>https://docs.oracle.com/javase/tutorial/networking/urls/definition.html</ref> | ||
− | #* '''IP''' - Numerical reference to a machine on a network (where DNS is not being used).<ref>https://en.wikipedia.org/wiki/IP_address</ref> | + | #* '''IP''' - Numerical reference to a machine on a network (where DNS is not being used).<ref name="infosec"/><ref>https://en.wikipedia.org/wiki/IP_address</ref> |
# "Ready?" | # "Ready?" | ||
#* '''IMMA CHARGIN MAH LAZER''' - | #* '''IMMA CHARGIN MAH LAZER''' - |
Revision as of 02:08, 21 February 2017
|
Contents
The GUI
A guide to the LOIC GUI:
- "Manual Mode (for p***ies)" - Select this mode to
- "F*CKING HIVE MIND" - Select this mode to volunteer your computer to the hive mind, and allow it to select the target URL.
- IRC server -
- Port -
- Channel -
- "Select your target"
- "Ready?"
- IMMA CHARGIN MAH LAZER -
- "Attack options"
DoS/DDoS
DoS is an acronym that stands for "Denial of Service," and is often classified as a cyber attack. When a user attempts to visit a website, www.google.com for example, they are making a request to that page for information (ask for information that is stored in Google's servers to be loaded on the user's browser). The concept behind DoSing is that malicious attackers can continually send these HTTP/UDP/TCP requests to a website, and overload the site's capability to process all of the requests. If the attacker is able to achieve a sufficient threshold of requests, the site may "shut down" and be unable to process requests made by any user. This is where the attack coins its name as once the site is down, users that attempt to access the site are denied service to that page. [5]
DDoS stands for "Distributed Denial of Service," and refers to a combined effort of multiple machines attempting to shut down (DoS) a site. This set of multiple machines can take the form of multiple users with individual machines, a single user with a bot-net (link/elaborate), or a combination of the two. By utilizing more than one machine, this gives the attacker(s) the ability to send more HTTP requests. The more machines, the more requests per minute, and the more likely the site will be successfully shut down. [6]
Defenses against DoSing/DDoSing:
- ip filtering
- tollgate
Anonymous
Project Chanology
(can only link to actual Wikipedia)
Ethical Implications
Pros
- stress testing websites' abilities to handle large numbers of requests at a time
- upholding First Amendment
- uniting tech community/hackers
Cons
- DDoSing a given website and "taking it down"
- incentivizing creation of BotNets
- anyone can use: don't understand gravity of actions
Terms
- GUI - Graphical User Interface[7]
- Hive Mind - The collective
- Troll -
References
- ↑ https://sourceforge.net/projects/loic/
- ↑ 2.0 2.1 2.2 http://resources.infosecinstitute.com/loic-dos-attacking-tool/#gref
- ↑ https://docs.oracle.com/javase/tutorial/networking/urls/definition.html
- ↑ https://en.wikipedia.org/wiki/IP_address
- ↑ https://www.us-cert.gov/ncas/tips/ST04-015
- ↑ http://www.digitalattackmap.com/understanding-ddos/
- ↑ https://techterms.com/definition/gui