From a technical perspective, it provides additional ability to append random characters to the attacked URL in case of HTTP flood, and to the packet payload in case of TCP/UDP.Īnother LOIC-modified tool included in this bundle is NewLOIC, which, despite its name, offers no new functionality, only a new GUI design.Īnonymous still consider LOIC and its various versions to be meaningful tools in its DDoS arsenal. The "Indonesia Fighter Cyber" hacking group created LOIC-IFC, which differs only in the default TCP/UDP flood message saying, "Merdeka atau Mati", which means "Freedom or Death" in Malay. LOIC-SD was first published by a Brazilian hacker group called Script Defenders and is mainly designed to overcome a language barrier by translating LOIC's user interface into Portuguese. Some Anonymous sub-groups localize and re-brand the LOIC tool. LOIC was notoriously known as the main attack delivery tool used in several Anonymous operations such as Operation Payback, Operation Chanology and more. Being JAVA based, JavaLOIC is a cross-platform tool with a built-in proxy feature that enables an attacker to hide his or her own IP address. Low Orbit Ion Cannon-based (LOIC-based) tools are prominent in this bundle of DDoS tools: LOIC, JavaLOIC, LOIC-IFC, LOIC-SD and NewLOIC. Screenshot of UnKnown DoSer attack traffic, demonstrating fields randomization Can't get enough of LOIC Screenshot of UnKnown DoSer - a Layer 7 flooder, with request randomization capability For example, the UnKnown DoSer, a Layer 7 flooder, even supports randomization of URL, User-Agent, and the Content-Length values in order to bypass hard-coded attack signatures. R.U.D.Y and other slow POST tools are noticeably missing from this bundle.Īnother group of tools provide some evasions, such as support for sending requests with different user agent and referer headers. If an attacker wants to launch a powerful Low and Slow DDoS attack, surprisingly he or she will find only a single tool in this bundle, the well-known perl tool, which is not authored by Anonymous at all. Screenshot of Pringle DDoS - a simple ICMP flooder
![anonymous ddos tool anonymous ddos tool](https://www.computerweekly.com/rms/security/Slide04-LOIC.jpg)
Other tools are focused on a single attack type, such as "Anonymous Ping Attack" and "Pringle DDOS", which only have ICMP flood capability. For example, some tools offer more Layer 7 attack granularity, while providing the attacker control of the attacked URL path and parameters and also supporting POST floods.
![anonymous ddos tool anonymous ddos tool](https://www.researchgate.net/profile/Ricardo-De-O-Schmidt/publication/48340429/figure/fig5/AS:306089372471301@1449988801756/Wireshark-trace-of-JS-LOIC-operation.png)
Most of the tools offer similar DDoS attack types-mostly HTTP, TCP, and UDP floods-but there is some interesting differentiation. Screenshot from the video of multiple attack tools in use at once.
![anonymous ddos tool anonymous ddos tool](https://www.datafoundry.com/media/images/blog/_1200x630_crop_center-center_82_none/DDoS-attacks-OpSacred.png)
This makes them very appealing to lay persons with little understanding of computer networking. It’s not necessary to have any understanding of how the attacks actually work in order to operate the tools. All of them are easy to use and have nice GUI menus. 2016 Tools BundleĪ substantial number of DDoS tools (20, in fact) are included in this bundle. Screenshot from the Anonymous DDOS Tools 2016 video on YouTube.
#Anonymous ddos tool zip file
The video contains detailed examples of uses for various DDoS tools, and the video description contains a link to a zip file containing these tools.
![anonymous ddos tool anonymous ddos tool](https://anonyviet.com/wp-content/uploads/2019/07/lol2.png)
In February 2016, the hacktivist group Anonymous published a hacktivist message in a video posted on YouTube.