LOIC Exposes Attackers

Just in case there was any confusion about this, the DDoS tool recommended by the so-called “Anonymous” group does not hide the source of attack — it is a simple load test application that includes its host IP address in outgoing packets.

The tool is called LOIC (Low Orbit Ion Cannon); a java version just released is called JLOIC. The LOIC FAQ tells users to lie when caught.

Q: What if I get caught and arrested?

A: You probably won’t. It’s recommended that attack with over 9000 other anons while attacking alone pretty much means doing nothing. If you are a complete idiot and LOIC a small server alone, there is a chance of getting arrested. No one will bother let alone have the resources to deal with DDoS attacks that happens every minute around the world. Then theres always the botnet excuse. Just say your pc was infected by a botnet and you have since ran antivirus programs and what not to try to get rid of it. Or just say you have NFI what a DDoS is at all.

PROTIP: If you do get arrested ALWAYS deny it, Explain it was botnet, Say you have dynamic IP and that they have the wrong guy. Also, epic lolz will be achieved because you are a fag. DDOS ONLY IN GROUPS.

Denial. That’s what they consider a “protip”. The FAQ makes it obvious that LOIC offers zero protection or means to attack anonymously.

Traffic from LOIC is easily traced to the attacker in its standard configuration. There is no need for a dump of network traffic to see this; it’s right there in the documentation.

The odds of arrest are increased by several factors, regardless of working in large groups. The prosecution claim from Holland gives a good example. Announcing online that you use LOIC to attack a prosecutor’s office, and others should too, is a good way to not only get caught but arrested and charged.

One thought on “LOIC Exposes Attackers”

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.