Botnet: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
 
No edit summary
Line 3: Line 3:
A host has to be compromised in order to install a bot on it. That can be done by exploiting known bugs and using standard tools like trojan horses or worms. Some bots are known to look for already installed backdoors and take over foreign bots.
A host has to be compromised in order to install a bot on it. That can be done by exploiting known bugs and using standard tools like trojan horses or worms. Some bots are known to look for already installed backdoors and take over foreign bots.


Botnets can be used for Distributed Denial of Service attacks, for vulnerability scanning of other systems, for spamming, and for any other such actions taking advantage of both the anonymity of the attacker and the mass of bots.
Botnets can be used for Distributed Denial of Service attacks, for vulnerability scanning of other systems, for spamming, and for any other such actions taking advantage of both the anonymity of the attacker and the mass of bots. Established botnets will often be leased at a high price for profit.

Revision as of 17:40, 14 November 2004

A Botnet is a collection of hosts (bots) under a common command and control infrastructure [Wikipedia: Botnet].

A host has to be compromised in order to install a bot on it. That can be done by exploiting known bugs and using standard tools like trojan horses or worms. Some bots are known to look for already installed backdoors and take over foreign bots.

Botnets can be used for Distributed Denial of Service attacks, for vulnerability scanning of other systems, for spamming, and for any other such actions taking advantage of both the anonymity of the attacker and the mass of bots. Established botnets will often be leased at a high price for profit.