Low Orbit Ion Cannon

The low orbit ion cannon is a very powerful tool that I am excited about! This post is about DDoS again and now I want to show you one specific tool which is called LOIC or low orbit ion cannon. This tool is pretty much really actually used for when it comes to DDoSing and stress testing because it is having the capability of sending all of packets with different ways and so on. You can send with DDoS and disable services on a specific server if they are vulnerable to the attack.

Low Orbit Ion Cannon

If you will enjoy reading and contributing to the discussion for this post, will you please join us on the YouTube video above and leave a comment there because I read and respond to most comments on YouTube? If you find anything helpful in this video or funny, will you please leave a like because you will feel great helping other people find it?


There is LOIC instance for Windows. Now here, I’m going to show you how we start it on the Linux because on Windows it’s easy. You just need to press next and next and you’re okay to go. Here now, open your web browser and navigate to LOIC download. Here we have our source forge so click that. Now, you see here that there is some malware detection on that file. Don’t worry about it. This is here because this tool can be used for pretty hard DDoSing scenarios. It’s really dangerous and we have to just hit it really hard and it is capable of denying our services on all the servers. This we have to and that’s why they warn us about malwares there. Don’t worry. We are even using Linux so we don’t have to worry about it.

You can see here that features are security and stress testing and there is a quick description about the tool. Now we have to download the tool by clicking the download link, just click here. Now, if you go down below, we see that the programming language is C# and it’s using Mono, here. .NET and Mono. To run that tool, one is not going to do the LOIC, we just need to install Mono and now we’re going to see how, click here to download and the file is going to download. I’ve already downloaded mine. That’s because I’m downloading it now.

Now just navigate to any search engine you want. I’ll use DuckDuckGo in my case. Here, just navigate Mono Linux install. Therefore, click the first thing that appears here. Now, I’ll go for download. Now, Ubuntu, it does not really matter. Since you are using Kali, all the links below the video are the same. Out here, you can actually copy and paste all the commands here. I’ll go for the debian one. You see they’re quite the same. Just copy that command, paste it in the terminal and you’re ready to go, you have Mono installed and the special reports from Mono and that’s the only thing you have to do.

Therefore, after writing that repository, you need to run the command install Mono develop. This is going to actually install all the development tools that Mono is using. As you can see, it’s a simple installation. Just copy and paste that repository. It’s going to even update the repositories, and therefore run that command that’s going to install Mono Development. Now, when we downloaded, the LOIC is executable. We need to navigate now the terminal, so open that, and go for the executable. In my case DDoS and here I have LOIC.exe here. Now, the only thing I need to type is just Mono and the file itself. As you can see now, the program appears. There is graphical user interface and it’s pretty much easy to understand. Now here, we have either URL or IP, we can specify one of them. For example, if you specify the URL, the tool is going to automatically convert that URL into an IP address. Even we can specify the direct IP address. It doesn’t really matter. For example, we’re going to specify our web server IP address. Let’s go here and type and click the LOIC button. This is going to LOIC the target.

Now, we have the attack options here. We have the timeouts, the message options here. We can define whatever you want basically. We can define as big message as we want. Here, we can define threats. For example, we can go for 90. We can define the method which can be TCP or HTTP, and we can define the port here. As you can see, the interface is pretty much easy to use. We can go for timeouts or disable it. Click here. Now, we have even the bar that indicates the speed of the tool itself. Now, we have the status down there, which actually, there was what are the current status of the attack and how much packet does it send, how much of them were successfully transmitted and how much failed. You’re going to see a reaction. When we are ready, we form the target. We have all the files correctly set up with the ports, which are merged in the threats, therefore we have the speed set up here and we are ready to go. I’ll click just that button but who’s going to actually flood our target with requests. You see how much the request will send, how much downloaded, how much threats are connected in the moment, as you can see there in the moment. Now the tool is actually flooding our server with packets, with requests. Now it’s a matter of time to actually make it to crash.

You can see guys the amount of speed that the tool, the LOIC is actually transmitting the packets, the speed with what the LOIC is sending packets you just create. It’s working pretty decent and doing its job perfectly. If you want hard DDoSing or stress testing, this is the tool to go, but keep in mind that this is not making you invisible. You are most likely to get detected by some kind of IDS or IPS so you have to be really careful using LOIC because it’s powerful but actually noisy too.

Thank you guys for watching. This is today’s video about DDoSing with LOIC. We’ve installed Mono, we installed the tool itself, you saw how it was done. In the next video, I’m going to show you how you can connect your machine to TOR network and therefore use that connection in order to create successful DDoS attack into other targets. I really appreciate you for watching and see you in the next video.

Thank you very much for staying all the way to the end of this post. The page you’ve seen is a part of How to Hack in 2019: Noob to Certified Ethical Hacker with CEH Version 10. This is a video course with 30-plus hours of video in it, hundreds of lectures that covers each individual module that is in the certified ethical hacking exam for Version 10. This course will not give you a certification, it prepares you take the CEH Version 10 exam.

You can see this course has a ton of videos in it. I’m imagining since you’ve made it to the end of this tutorial, you will love this course. It’s $27.81 on uthena.com which is a platform. I’m Jerry Banfield, the founder of this platform. You can also get this course within the Ethical Hacking Forever course bundle for $48.81. You buy this bundle once. We will add new ethical hacking courses forever too. For example, we have a Python hacking course coming out now that will be added to this bundle very shortly.


This bundle has six courses currently in it, 100-plus hours of video. It’s one of the best options in the world to learn ethical hacking. Three courses right here, these three all from 2019 and we will keep this bundle updated forever for you. If you check the links in the video description, you will also find some additional coupons you may be able to get to take the course for less, to take different courses, to subscribe, and even find different stores that may have the same course.
I appreciate you watching with us today. I imagine if this is helpful, you’ll leave a like on it because you will feel good about leaving a like on the video and giving something back. If you subscribe you will have the chance to watch more videos like this every day. If you take a look in the description, you’ll find playlists related to this video with more videos for free on YouTube. I love you, you’re awesome, and I hope you have a wonderful day today.

Get private label rights to sell this course yourself as a partner!

Thank you for making it to the end of this post.

I love you.

You are awesome.


Jerry Banfield