Website
Update is in progress

Steps to perform DOS attack against a website (On Targeted URL or IP)

“Remember, before performing such attacks, you must have permit from target owner to do so, or else it is illegal and punishable under IT Acts & Laws.”
  • Step 1:
    Run the executable LOIC tool.
  • Step 2:
    Enter the URL of the website in The URL field and click on Lock O. Then, select attack method (TCP, UDP or HTTP). I will recommend TCP to start. These 2 options are necessary to start the attack.
  • Step 3:
    Change other parameters per your choice or leave it to the default. Now click on the Big Button labeled as “IMMA CHARGIN MAH LAZER.” You have just mounted an attack on the target.

  • After starting the attack you will see some numbers in the Attack status fields. When the requested number stops increasing, restart the LOIC or change the IP.
    You can also give the UDP attack a try. Users can also set the speed of the attack by the slider. It is set to faster as default but you can slow down it with the slider.

    Performing DOS Attack Against a Live Website

    “It is to be noted, The target site (i.e "http://www.4testing.c1.biz/") is owned by ADMIN of CYBER4ALL. And all activities are performed under surveillence. The attack which i am about to demonstrate is only for educational purposes. No one should perform such activities on any target without owner's consent.”
  • Step 1: Homepage of the target site ("It's Owned by ADMIN")

  • Home Page of http://www.4testing.c1.biz
  • Step 2: Start the LOIC Tool

  • Dashboard of LOIC Tool
  • Step 3: Enter the website http://www.4testing.c1.biz/ in URL field

  • URL OF Targeted SITE
  • Step 4: Select the method Type "HTTP".

  • Use Of HTTP Method for Dos Attack On Targeted SITE using LOIC
  • Step 5: Press the "IMMA CHARGIN MAH LAZER"

  • Final Step for Dos Attack On Targeted SITE using LOIC

  • Output: Our Target site "" not able to reach.

  • Result for Dos Attack On Targeted SITE using LOIC
    Warning :
    The articles and tutorials published on this site are performed under safe environments with all safety measures and supervision of Cyber Experts & Professionals. And it is only intend for educational purposes & to be aware about such activities. These contents should not be used for any illegal purposes.
    Always Remember,
    "Performing such things without taking concerns of respective owners of System & Resources is tottaly illegal and punishable under various IT Acts and Laws."
    Top