In this case, a ping is sent that transfers 100 bytes of data.
On each click on the send button, a CLI window will open.ĭoS attack with an attack strength of 100 Each send action launches an ICMP flood directed at the target selected. The preparation of the attack is completed by clicking the “Send” button. The Anonymous tool’s user interface: setting the attack strength The scale goes from 100 to 65,000 and determines the data size of a ping request in bytes.
No knowledge of how to resolve a DNS name is required.Īfter this, a slider can be used to set the attack strength. (The LSOC operates the domain for testing purposes.) With one click on the “LOCK ON” button, the target’s IP address is determined. The only thing the user needs to do is entering the target’s FQDN (fully qualified domain name), e.g. The work required from the user is reduced to a minimum. The Anonymous tool’s user interface: domain input box Instead, it comes with a modern look and an easy to use GUI. The user interface no longer has anything in common with earlier command line tools with hundreds of options. A simple double-click on the icon will start the DoS attack tool.
The Link11 Security Operation Center recently examined how the tool works, and how dangerous its attacks can be.Īfter downloading and unpacking the Anonymous ZIP archive, the installation of the program named Anonymous Ping Attack.exe doesn’t take long.
Unfortunately, this type of traffic can be exploited for attacks. Usually, they’re used to analyze connection issues and other incidents. Generally, the purpose of a ping is to check the availability of other systems and to provide an indicator for the transfer time between two points on a network. The program’s name refers to ping attacks, a specialized type of DoS attack. It’s part of a set of tools that also includes tutorials, and enables any internet user to run denial-of-service attacks on any target of their choosing. One of these is the Anonymous Ping Attack tool, which is available on the Clearnet and can be downloaded for free. The Anonymous group has been making its DoS programs publicly available for years.
Supposedly #RefRef uses the target’s own processing power against itself, taking the server down by creating resource exhaustion.Īn Anonymous member interviewed by the Tech Herald said, “Imagine giving a large beast a simple carrot, watching the best choke itself to death.Today, even beginners and technical laymen can easily launch a DoS attack, using one of the many free attack tools that have been made available. The new weapon is develo ped in JavaScript and exploits a server as long as the target supports JavaScript and SQL. The new #RefRef tool is set to begin annoying corporations and governments in September. LOIC has been effective in past campaigns, however, the tool doesn’t have a high enough detection protection for the infamous hackers and this weakness has led to the many global arrests in the last year.
The DDoS tool being used by Anonymous at the moment is called the Low Orbit Ion Cannon (LOIC), named after a weapon from Command & Conquer. The new attack program, called #RefRef, is being developed in time for the Blackhat conference in Las Vegas and was recently tasted on the currently unhappy Pastebin website. Anonymous is building a bigger, more vicious weapon to replace its current DDoS tool.