HOIC & LOIC

on Rabu, 16 April 2014
Hello Anonymous People,

I'm here today just for provide the HOIC & LOIC. The two programs developed for attacking DDoS.
If you don't know a lot about both I'll speak about them.

HIgh Orbit Ion Cannon
hoic99korg201141817659

About:
The HOIC is an enhanced version and easier to use LOIC (Low Orbit Ion Cannon), application previously used by the group members. The big difference between them is that formerly required a basic understanding of programming language to help bring down a website, now you can simply click a mouse and type a web address in a keyboard to do this.

In HOIC, you type the address, select the number of executions that will perform according to the width of your band and ready, started the attacks.

No Barriers
A member of Anonymous have reported to Gizmodo that LOIC was already in the sights of developers, who have created firewalls resistant to it. The HOIC, however, is new and has not yet found a barrier created by security experts. That is, the gun is powerful, private, and so far, not found a sheriff height.

Download :
https://mega.co.nz/#!IMw0iCJY!Hg5o...jiXDLLjWs2N6SIk


Low Orbit Ion Cannon

loicw

About:
LOIC (Ion Cannon Low Orbit) is an application created by hackers affiliated with the site 4chan made to launch distributed denial of service (DDoS) attacks on websites - when used en masse by thousands of anonymous users. Recent victims of the attacks were the websites of Visa, Mastercard and PayPal
The LOIC is a simple application ...
The idea behind LOIC is that you can participate in online attacks even if you do not like the idea of ​​being a hacker. Just download a copy of LOIC (available for Windows, Mac and Linux), put the target - the URL or IP address - and ready.

"[...]That can be controlled by a central server"

The Windows version of LOIC has a function "Hivemind" that allows you to point your copy to an IRC server, allowing someone else to control which site will target customers LOIC connected. This person may be, for example, one of the administrators anonymous behind Operation Payback, a campaign against Visa, Mastercard, PayPal and other financial organizations in retaliation for the decision not to do more business with Wikileaks. How many are needed LOICs appointed to the same site in order to create a real impact, leaving a central administrator press the red button of destruction makes the network more efficient LOICs.
But give hackers control your computer voluntarily? Sounds dangerous. But as the client LOIC is open source, the chances of a virus attack or backdoor reach the system a user is minimal.

"[...]To launch a deadly stream of internet packages"

The LOIC is basically a network connection from your computer to flood a website with requests unacknowledged, switched to a specific web server. Alone, one computer rarely generates requests TCP, UDP or HTTP enough to harm a web server - so applications can be easily overlooked as normal requests for web pages are serviced normally.
But when thousands of users run LOIC at the same time, the wave of requests becomes unbearable, and often makes the web server (or one of the computers connected to it, like a database server) stops working, or does with the normal requests are not met.

"[...]With low risk to the wearer."

As a DDoS attack knocks servers - at least when it works as expected - the log files, which normally would record each connection that accesses the site, simply do not work. And even if they work, many users say that LOIC was another user on their network, or the computer it was part of a botnet - a customer DDoS-shaped virus that functions as a cooperative LOIC, but without the computer owner know that he is participating

Download :
https://mega.co.nz/#!ENgWlKrQ!EYkj...KvJUDgeIWWpf2VE

0 komentar:

Posting Komentar