Cannon APD Series Solutions Cannon, VEAM, BIW Cannon APD Series ISO 15170 Connectors
Low orbit ion cannon
-
Upload
cutiewolfie -
Category
Technology
-
view
205 -
download
0
Transcript of Low orbit ion cannon
![Page 1: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/1.jpg)
LOW ORBIT ION CANNON
(LOIC)
![Page 2: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/2.jpg)
What is it? Name of origin : a super weapon from
real time strategy PC game “Command and Conquer : Tiberian Sun”
![Page 3: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/3.jpg)
What is it? Network Stress Testing application Denial-of-Service Attack application Only 131 KB Written in C# (..later in JavaScript..) Developed initially by Praetox
Technologies -> Open Source domain O/S platforms : Windows, Linux, MacOS X,
Android
![Page 4: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/4.jpg)
What is it?LOIC application interface..
![Page 5: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/5.jpg)
How does it works? Performs a Denial-of-Service (DoS) attack
or.. a Distributed Denial –of-Service (DDoS)
attack when being used by multiple users by flooding the server with Transmission
Control Protocol (TCP) or User Datagram Protocol (UDP) packets
Disrupt the service of a particular host
![Page 6: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/6.jpg)
How does it works?What is TCP & UDP?
TCP UDPReliability: TCP is connection-oriented protocol. When a file or message send it will get delivered unless connections fails. If connection lost, the server will request the lost part. There is no corruption while transferring a message.
Reliability: UDP is connectionless protocol. When you a send a data or message, you don't know if it'll get there, it could get lost on the way. There may be corruption while transferring a message.
Ordered: If you send two messages along a connection, one after the other, you know the first message will get there first. You don't have to worry about data arriving in the wrong order
Ordered: If you send two messages out, you don't know what order they'll arrive in i.e. no ordered
![Page 7: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/7.jpg)
How does it works?What is TCP & UDP? ..cont’d
TCP UDP
Heavyweight: - when the low level parts of the TCP "stream" arrive in the wrong order, resend requests have to be sent, and all the out of sequence parts have to be put back together, so requires a bit of work to piece together.
Lightweight: No ordering of messages, no tracking connections, etc. It's just fire and forget! This means it's a lot quicker, and the network card / OS have to do very little work to translate the data back from the packets.
Streaming: Data is read as a "stream," with nothing distinguishing where one packet ends and another begins. There may be multiple packets per read call.
Datagrams: Packets are sent individually and are guaranteed to be whole if they arrive. One packet per one read call.
![Page 8: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/8.jpg)
How does it works?What is TCP & UDP? ..cont’d
TCP UDPExamples: World Wide Web (Apache TCP port 80), e-mail (SMTP TCP port 25 Postfix MTA), File Transfer Protocol (FTP port 21) and Secure Shell (OpenSSH port 22) etc.
Examples: Domain Name System (DNS UDP port 53), streaming media applications such as IPTV or movies, Voice over IP (VoIP), Trivial File Transfer Protocol (TFTP) and online multiplayer games etc
(http://www.cyberciti.biz/faq/key-differences-between-tcp-and-udp-protocols/)
(http://www.skullbox.net/tcpudp.php)
![Page 9: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/9.jpg)
How does it works?Denial-of-Service
Denial-of-Service Attack Schematic
![Page 10: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/10.jpg)
How does it works?Denial-of-Service
LOIC Denial-of-Service attack..
![Page 11: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/11.jpg)
How does it works?LOIC Denial-of-Service attack by flooding the server with TCP & UDP packets..
![Page 12: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/12.jpg)
How does it works?Weaponization
Network stress testing application which should be used for testing the network stress now being used as a “weapon” to flood the server with Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) packets
![Page 13: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/13.jpg)
Who use it? International network of internet
activists who support “internet piracy” and “freedom of information”
Hacktivist entities
“The Anonymous”
![Page 14: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/14.jpg)
When?
Operation Payback is a Bitch (Sept-Nov 2010) As a retaliation of Bollywood companies DDos
attack on illegal content websites Launch DDos attack Oppose the internet pro-copyright & anti-piracy
organizations, firms and individuals
![Page 15: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/15.jpg)
When? Operation Payback is a Bitch (Sept-Nov
2010) ...cont’d Targets Motion Picture Association of America
(MPAA), International Federation of the Phonographic Industry, Recording Industry Association of America (RIAA)
UK’s firm ACS : Law, Australian Federations Against Copyright Theft (AFACT), Associacao do Comercio Audiovisual de Portugal (ACAPOR)
![Page 16: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/16.jpg)
When? Operation Avenge
Assange (Dec 2010) As a reaction to support
Julian Assange’s WikiLeaks Attack corporation which
stop their support/donations to WikiLeaks
Amazon, PayPal, BankAmerica, PostFinance (Swiss), MasterCard, Visa
![Page 17: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/17.jpg)
When? Operation Avenge Assange (Dec 2010)
...cont’d Threat British Government websites if Assange
extradite to Sweden
![Page 18: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/18.jpg)
Where? LOIC works in world wide web but.. It works best in an unprotected network
![Page 19: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/19.jpg)
Countermeasure Firewall
To control/stop unwanted traffic
![Page 20: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/20.jpg)
Countermeasure Audit Trail/System Logs
To identify and track down the attacker(s)
![Page 21: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/21.jpg)
Please be cautious...
![Page 22: Low orbit ion cannon](https://reader036.fdocuments.in/reader036/viewer/2022070600/58a004691a28abd40b8b5757/html5/thumbnails/22.jpg)
THANK YOU