Boosters also let HOIC users customize the application and randomize assaults in order to circumvent caching mechanisms that protect servers from traffic spikes.ĭespite booster use, the attack traffic amount generated by HOIC is still not enough for a single user to take down a target system. Unlike LOIC, which is able to launch TCP, UDP and HTTP GET floods, HOIC conducts attacks based solely on HTTP GET and POST requests.Īdd-on scripts called boosters-not available in the LOIC application-can greatly increase attack magnitude. The application can open up to 256 simultaneous attack sessions at once, bringing down a target system by sending a continuous stream of junk traffic until legitimate requests are no longer able to be processed. Widespread HOIC availability means that users having limited knowledge and experience can execute potentially significant DDoS attacks. See how DDoS Protection can help you with DDoS attacks. Department of Justice, the Recording Industry Association of America, the Motion Picture Association of America and Broadcast Music, Inc.
It was launched in retaliation for the shutting down of Megaupload, a filesharing website, and targeted websites belonging to the U.S.
This differs from LOIC, which requires thousands of users to coordinate and launch an attack.Īnonymous first used HOIC in 2012 during Operation Megaupload - at the time one of the largest DDoS assaults ever recorded.