How to use LOIC (Low Orbit Ion Cannon)

"(It's not me in the video)"

the fable of gauss and flame






























                                                                                                                  Andrew Gomez, 2013


How to use LOIC (Low Orbit Ion Cannon)




This app is compatible with your device




Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain, and now is hosted on several open source platforms.
The software has inspired the creation of an independent Javascript version called JS LOIC, as well as LOIC-derived web version called Low Orbit Web Cannon. These enable a DoS from a web browser.





Using this application against the law may lead to consequences. LOIC Responsibly. The developer assumes no responsibility for your actions.

Low Orbit Ion Cannon
An unofficial port of the Low Orbit Ion Cannon (LOIC) software used for flooding packets; Now on mobile! Simply lock on to a target, specify the numerous attack options and the desired settings, and FIRE!

Attempting to use an outrageous amount of threads will crash the application. A higher-end device with at least 1GB of RAM is recommended.

Source Code:




Cant trace 

If you download orbot and orweb and have a rooted device you can choose to run this program through it so yout ip is in a different country... To root search "how to root" phone version, its very easy:)

Adam Kizer 




Low Orbit Ion Cannon - An open source network stress tool for Windows. Based on loic project at and writen in C#. USE ON YOUR OWN RISK. WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES.







1 of 5 2 of 5 3 of 5 4 of 5 5 of 5

people are giving bad reviews and they're to dumb to understand that using only one desktop computer isnt going to do anything

Posted 07/08/2013



1 of 5 2 of 5 3 of 5 4 of 5 5 of 5

Okay I downloaded Low-Orbit Ion Canon and used a virus scanner and it came up with a crap ton of viruses/malware whatever. Since it won't allow me to post websites for some odd reason just please go to Google type in online virus scanner which took me to virus total and submit LOIC- so you can scan it. So what's the deal with all that? Also i'm not hating/disrespecting it just threw red flags in my head was all...I'm probably totally wrong and all these programs compressed in this file is what probably is what helps the program do what it's job is. Sorry if I wasted your time guys, thanks! SHA256: ded2f255aff23f8f2c101946387a67e313ad34bcca847e902b82cc90c096aa4d File name: Detection ratio: 35 CLEAN / 47 VIRUSES Analysis date: 2013-05-22 02:50:22 UTC ( 0 minutes ago ) Agnitum HackTool.Loic!7QOq3UPNerk 20130521 AhnLab-V3 Win-Trojan/Hacktool.135168.B 20130521 AntiVir SPR/Tool.Oylecann.A.107 20130522 Antiy-AVL HackTool/MSIL.Loic.gen 20130521 Avast Win32:PUP-gen [PUP] 20130521 BitDefender Gen:Variant.Application.HackTool.1 20130522 CAT-QuickHeal (Not a Virus) 20130520 ClamAV HackTool.DDOS.LOIC-2 20130522 Commtouch W32/Loic.ZGGA-4096 20130522 Comodo UnclassifiedMalware 20130522 DrWeb Tool.Loic.5 20130522 Emsisoft Gen:Variant.Application.HackTool.1 (B) 20130522 eSafe Win32.HackTool.DDOS 20130520 ESET-NOD32 a variant of MSIL/HackTool.LOIC.AB 20130521 F-Prot W32/Loic.A 20130522 F-Secure Gen:Variant.Application.HackTool.1 20130521 Fortinet Riskware/Loic 20130522 GData Gen:Variant.Application.HackTool.1 20130522 Ikarus HackTool.Win32.Oylecann 20130522 Jiangmin HTool.MSIL.u 20130520 K7AntiVirus Hacktool 20130521 Kingsoft VIRUS_UNKNOWN 20130506 Malwarebytes PUP.HackTool.LOIC 20130522 McAfee HTool-Loic 20130522 McAfee-GW-Edition HTool-Loic 20130522 Microsoft HackTool:Win32/Oylecann.A 20130522 MicroWorld-eScan Gen:Variant.Application.HackTool.1 2013052 PCTools Hacktool.Generic 20130521 Sophos Troj/Loic-A 20130522 Symantec Hacktool 20130522 TheHacker Trojan/ 20130521 TrendMicro-HouseCall HKTL_LOIC 20130522 VIPRE Trojan.Win32.Generic!BT 20130522 ViRobot HackTool.DDoS-Agent.135168 20130521 (�less)

Posted 05/22/2013






Low Orbit Ion Cannon

From Wikipedia, the free encyclopedia

Page semi-protected

Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain,[1] and now is hosted on several open source platforms.[2][3]

The software has inspired the creation of an independent JavaScript version called JS LOIC, as well as LOIC-derived web version calledLow Orbit Web Cannon. These enable a DoS from a web browser.[4]


LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.[5]


Security experts quoted by the BBC indicated that well-written firewall rules can filter out most traffic from DDoS attacks by LOIC, thus preventing the attacks from being fully effective.[6] Specifically, it has been claimed that filtering out all UDP and ICMP traffic helps to address LOIC attacks in an efficient way.[7] However, the firewall rules need to be entered upstream, e.g. at the ISP of the site operator, where the backbone is converted to the server's broadband line. If the packets still have to travel through the server's limited line, then filtering the packets at the firewall level is not a valid deterrence, since the packets still have to travel to the firewall before the firewall can do anything to the packets, and the line between the server's ISP and the server's firewall will be clogged.[7]

LOIC attacks are easily identified in system logs, and the attack can be tracked down to the IP addresses used at the attack.[8]

Notable uses

Project Chanology and Operation Payback

LOIC was used by Anonymous (group) during Project Chanology to attack websites from the Church of Scientology,[9] once more to (successfully) attack the Recording Industry Association of America's website in October 2010,[10] and again during Operation Payback in December 2010 to attack the websites of companies and organizations that opposedWikiLeaks.[11][12]

Operation Megaupload

Main articles: Operation Megaupload and Megaupload

In retaliation for the shut down of the file sharing service Megaupload and the arrest of four workers, Anonymous DDoSed the websites of UMG (the company responsible for the lawsuit against Megaupload), the United States Department of Justice, the United States Copyright Office, the Federal Bureau of Investigation, the MPAA, Warner Brothers Music and the RIAA, as well as the HADOPI, all on the afternoon of January 19, 2012, through LOIC.

Origin of name

The LOIC application is named after the Ion cannon, a fictional weapon from the Command & Conquer video game franchise.[13]

Other implementations

Another implementation of LOIC named LOIC++ has been made to run natively on Linux.[citation needed] There is also an OS independent implementation written in Java named Java LOIC.



















Denial-of-service attack

From Wikipedia, the free encyclopedia

In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. This technique has now seen extensive use in certain games, used by server owners, or disgruntled competitors on games. Increasingly, DoS attacks have also been used as a form of resistance. DoS they say is a tool for registering dissent. Richard Stallman has stated that DoS is a form of 'Internet Street Protests�.[1] The term is generally used relating tocomputer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.[2]

One common method of attack involves saturating the target machine with external communications requests, so much so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered essentially unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resourcesso that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

Denial-of-service attacks are considered violations of the Internet Architecture Board's Internet proper use policy, and also violate theacceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual 













Open-source software

From Wikipedia, the free encyclopedia


Open-source software (OSS) is computer software with its source code made available and licensed with alicense in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.[1] Open-source software is very often developed in a public, collaborative manner. Open-source software is the most prominent example of open-source development and often compared to (technically defined) user-generated content or (legally defined) open-content movements.[2]

A report by the Standish Group (from 2008) states that adoption of open-source software models has resulted in savings of about $60 billion per year to consumers.[3][4]



The Open Source Initiative's definition is widely recognized[who?] as the standard or de facto definition. Eric.S.Raymond and Bruce Perens formed the organization in February 1998. With about 20 years of evidence from case histories of closed and open development already provided by the Internet, OSI{Open Source Initiative} continued to present the "open source" case to commercial businesses. They sought to bring a higher profile to the practical benefits of freely available source code, and wanted to bring major software businesses and other high-tech industries into open source.

OSI uses The Open Source Definition to determine whether it considers a software license open source. The definition was based on theDebian Free Software Guidelines, written and adapted primarily by Perens.[5][6][7] Perens did not base his writing on the "four freedoms" of Free Software from the FSF, which were only widely available later.[8]

Under Perens' definition, open source describes a broad general type of software license that makes source code available to the general public with relaxed or non-existent copyright restrictions. The principles, as stated, say absolutely nothing about trademark or patent use and require absolutely no cooperation to ensure that any common audit or release regime applies to any derived works. It is an explicit "feature" of open source that it may put no restrictions on the use or distribution by any organization or user. It forbids this, in principle, to guarantee continued access to derived works even by the major original contributors.[citation needed]

However, Richard Stallman of the Free Software Foundation flatly opposes the term "Open Source" being applied to what they refer to as "free software". Although it is clear that legally free software does qualify as open source, Stallman considers that the category is abusive.[9] Critics also oppose the professed pragmatism of the Open Source Initiative, as they fear that the free software ideals of freedom and community are threatened by compromising on the FSF's idealistic standards for software freedom.[10][11]

Increasingly[citation needed], the consensus term "free and open source software" is used by the communities at large to describe the common ground between free software and open source software.[citation needed]


"(It's not me in the video)"


had I known

then what

I know

now I

would have protested

with great indignation and

at, my

at my


my pinky fleshy


on the

screen it

is not me;

and I would seppuku like Mishima


"When a captive lion steps out of his cage, he comes into a wider world than the lion who has known only the wilds. While he was in captivity, there were only two worlds for him - the world of the cage, and the world outside the cage. Now he is free. He roars. He attacks people. He eats them. Yet he is not satisfied, for there is no third world that is neither the world of the cage nor the world outside the cage." 

-               Yukio Mishima, Thirst for Love












the fable of gauss and flame




A new virus capable of spying on bank transactions and stealing sensitive data such as browser passwords, cookies and network information has been discovered infecting computers in Middle East.

Called "Gauss," the virus was designed to siphon data from several major Lebanese banks as well as users of CitiBank and PayPal, sending the stolen information back to its still-unknown creator.

It was detected by Kaspersky Lab, the same security firm that found the Flame virus earlier this summer.








A nasty and complex malware program known as Flame has been unmasked after four years of cyber-attacks on several countries, according to Russian anti-virus firm Kaspersky Lab.

The firm — which analyzed the malware over the weekend and revealed it to be the largest and most complex attack toolkit to date — believes that it was commissioned by a country or countries' government.

"Flame is a covert operation in cyber-space and without a doubt, it's been commissioned by a nation-state or nation-states," senior researcher Roel Schouwenberg at Kaspersky Lab toldMashable. "Global governments are investing more and more money in so-called offensive capabilities, and it's a lot easier and cheaper than traditional espionage and warfare."

Flame is currently being used for cyber-espionage and it could infect computers to steal data and sensitive information, the company said.