Protect yourself from LOIC attacksĪ well-designed firewall should protect you from most LOIC attacks. Hackers also attacked RIAA in 2010 as a protest against copyright laws. In 2010, for example, hackers targeted a corporate site that stopped supporting Wikileaks. LOIC has been used in several devastating attacks. But when several people join together, they're much more powerful, and their work can be catastrophic for your site. Individuals can launch attacks from one server, but their influence is limited. Connections stay open, and eventually, your server can't handle all of the demands. How does an ion cannon DDoS work?ĭuring an LOIC attack, a hacker bombards your server with UDP, TCP, or HTTP packets. Let's walk through what an attack looks like, and we'll explain how you can protect yourself. In most cases, LOIC is used by so-called "hacktivists" that hope to make you pay attention and change some policy or stance.īut an attack like this can be devastating, as a downed website simply can't serve your customers. And they can't use the tool to steal any information. Hackers using LOIC rarely ask for a payment or ransom. But that same tool can be used to enact a distributed denial of service (DDoS) attack. Low orbit ion cannon (LOIC) is an open-source program anyone can download and use to stress test a website or app.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |