Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Impact with Low Orbit Ion Cannon (LOIC)

Course Cover
compare button icon

Course Features

icon

Duration

23 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

23 minutes

Course Description

Do you want to know how to test the resilience of an application against denial-of-service attacks? This course, Impact with Low Orbit Ion Cannon, will teach you how to use LOIC to carry out DoS attacks in a red-team environment. You'll first be able to access the LOIC interface, and then you will discover its features. Next, you will use what you have learned to attack a remote host with a network flood. Finally, you will simulate a Distributed Denial of Service attack (DDoS), using the hivemind function to control multiple hosts running LOIC. You'll be able to use these techniques MITRE ATT&CK Direct Network flood - ID T1498.001 and Service Exhaustion flood - ID 1499.002 with LOIC once you have completed this course. Knowing how these techniques could be used against your organization or individual will help you to identify and defend against certain attack vectors.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Learn how to utilize LOIC to execute Denial of Service (DoS) attacks in a red team environment

First, you’ll access the LOIC interface and discover its features

Next, you’ll apply what you learned to execute a network flood attack on a remote host

Finally, you’ll simulate a Distributed Denial of Service (DDoS) attack by using the hivemind feature to control multiple hosts running LOIC

When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques MITRE ATT&CK Direct Network Flood – ID T1498

001, and Service Exhaustion Flood – ID 1499

002 using LOIC

More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors

Course Instructors

Author Image

Matt Glass

Instructor

Matt Glass is a Regional Field Service Support Lead in Yokosuka, Japan, working as a government contractor. Matt has more than 13 years of IT experience in a variety of roles. Consistently finding jo...
Course Cover