Botnet

Botnet


A botnet is a logical collection of internet-connected devices such as computers, smartphones or IoT devices whose security has been breached and control ceded to a third party.The word "botnet" is a combination of the words "robot" and "network". Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection. Each such compromised device, known as a"bot", is created when a device is penetrated by software from a malware (malicious software) distribution. The controller of a botnet is able to direct the activities of these compromised computers through communication channels formed by standards-based network protocols such as IRC and Hypertext Transfer Protocol (HTTP).

Architecture Of Botnet:

Client-Server Model:-

These botnets operate through Internet Relay Chat networks, domains, or websites. Infected clients access a predetermined location and await incoming commands from the server. The bot herder sends commands to the server, which relays them to the clients.Clients execute the commands and report their results back to the bot herder.

Peer-to-peer:-

A peer-to-peer (P2P) network in which interconnected nodes ("peers") share resources among each other without the use of a centralized administrative system In response to efforts to detect and decapitate IRC botnets, bot herders have begun deploying malware on peer-to-peer networks. These bots may use digital signatures so that only someone with access to the private key can control the botnet

要查看或添加评论,请登录

Shivam Singh的更多文章

  • Investor Proposal

    Investor Proposal

    Hello I hope you find this in a healthy state. I am Shivam from AllinOne Cyberteam and we are looking for an investor…

  • Pharming

    Pharming

    Pharming is yet another way hackers attempt to manipulate users on the Internet. While phishing attempts to capture…

  • Spyware

    Spyware

    Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive…

  • How To Secure Rooted Android From Security Threats

    How To Secure Rooted Android From Security Threats

    The below tips are helpful and efficient, and you should implement them today to make sure that apps for your rooted…

  • Union Based SQLI

    Union Based SQLI

    Union Based SQLI Requirements :- ? SQL Injection Dorks. ? Vulnerable Website.

  • Google Dork

    Google Dork

    A Google Dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to…

  • Data Breach

    Data Breach

    A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted…

  • What is Footprinting?

    What is Footprinting?

    Footprinting is basically the first step where hacker gathers as much information as possible to find ways to intrude…

  • What is SQL Injection?

    What is SQL Injection?

    SQL injection attack is a code injection technique or method, which is used to attack data driven applications. In this…

  • Phases of Ethical Hacking

    Phases of Ethical Hacking

    Like every discipline out there in the world, ethical hacking is divided into distinct phases. Ethical hacking has 6…

社区洞察

其他会员也浏览了