翻訳と辞書 |
High Orbit Ion Cannon : ウィキペディア英語版 | High Orbit Ion Cannon
The High Orbit Ion Cannon, often abbreviated to HOIC, is an open source network stress testing and denial-of-service attack application written in BASIC designed to attack as many as 256 URLs at the same time. It has been designed to replace the Low Orbit Ion Cannon which was developed by Praetox Technologies and later released into the public domain. The security advisory for the HOIC was released by Prolexic Technologies in February 2012. ==Development== The HOIC was developed during the conclusion of Operation Payback by the hacktivist group Anonymous. As Operation Payback concluded there was massive pressure on the group from law enforcement agencies, which captured and prosecuted more than 13 individuals connected with the group. This forced many members of the group to rethink their strategies and subsequently this part of the group launched Operation Leakspin. However a large part of Anonymous remained focused on launching opt-in DDoS attacks. However the Low Orbit Ion Cannon was not powerful enough to launch attacks with such a limited number of users. Therefore the HOIC was designed to remedy this with the ability to cause HTTP Flood with low number of user agents with as few as 50 users being required to successfully launch an attack, and co-ordination between multiple users leading to an exponential increase in the damage. The HOIC was the first tool of its kind to have support for the so-called "booster files", configurable VBscript modules that randomize the HTTP headers of attacking computers, allowing thousands upon thousands of highly randomized combinations for user agents.〔 Apart from allowing user agents to implement some form of randomization countermeasures the booster files can and have been used to increase the magnitude of the attack.
抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「High Orbit Ion Cannon」の詳細全文を読む
スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース |
Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.
|
|