LOIC(Low Orbit Ion Cannon)
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
science projects buddy
Active In SP

Posts: 278
Joined: Dec 2010
14-12-2010, 10:24 PM

LOIC is an open source network stress testing application, written in C#.It performs a distributed denial-of-service (DDoS) attack on a target site. The method is to flood the target site with TCP packets, UDP packets, or HTTP requests. This finally results in the disruption of the service to the host. An imaginary weapon in the Command & Conquer series of video games lends its name to the tool. Recording Industry Association of America's website, Scientology websites etc were the websites which were targeted by an anonymous group. The companies and organizations that opposed WikiLeaks were also attacked using this tool.


Near to 30,000 downloads of this tool has been reported from the site between 8 and 10 December 2010. The recipient of the attacks can log a Traceable IP address records. From this, the individual user conducting DDoS attacks can be identified. The LOICs javascript version is also been designed which can be run from the web browser itself.

How DDoS attack performed using LOIC application

Amazon, paypal, visa and master card and many similar companies banned wikileaks and these sites got attacked with Ddos attacks. Whenever a group of users use LOIC application by targeting a site by flooding the server with TCP packets, UDP packets, or HTTP requests the site will not respond properly and this is called denial-of-service.

For more details, see:
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Capturing Hand or Wrist Vein Images for Biometric Authentication Using Low-Cost study tips 0 333 20-08-2013, 04:30 PM
Last Post: study tips
  A Low Cost Vein Detection System Using Near Infrared Radiation study tips 0 329 20-08-2013, 04:29 PM
Last Post: study tips
  Low Energy Adaptive Clustering Hierarchy Report study tips 0 388 09-07-2013, 04:54 PM
Last Post: study tips
  Packet Capture With libpcap and other Low Level Network Tricks pdf study tips 0 337 17-06-2013, 03:18 PM
Last Post: study tips
  Low-Cost Low-Power Radios: Bluetooth and Zigbee study tips 0 229 28-05-2013, 03:30 PM
Last Post: study tips
  A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop study tips 0 539 16-05-2013, 03:27 PM
Last Post: study tips
  A Low-Cost Efficient Wireless Architecture for Rural Network Connectivity pdf study tips 0 340 18-02-2013, 09:44 AM
Last Post: study tips
  Wireless Integrated Network Sensors: Low Power Systems on a Chip pdf project girl 0 406 22-01-2013, 12:51 PM
Last Post: project girl
  Low power High Efficient Hardware Implementation of Network Security Algorithm pdf project girl 0 298 16-01-2013, 03:19 PM
Last Post: project girl
  Improved machine learning techniques for low complexity MPEG-2 to H.264 transcoding u seminar tips 0 386 02-01-2013, 03:51 PM
Last Post: seminar tips