Botnet - Formation and Exploitation

Formation and Exploitation

This example illustrates how a botnet is created and used to send email spam.

  1. A botnet operator sends out viruses or worms, infecting ordinary users' computers, whose payload is a malicious application—the bot.
  2. The bot on the infected PC logs into a particular C&C server.
  3. A spammer purchases the services of the botnet from the operator.
  4. The spammer provides the spam messages to the operator, who instructs the compromised machines via the control panel on the web server, causing them to send out spam messages.

Botnets are exploited for various purposes, including denial-of-service attacks, creation or misuse of SMTP mail relays for spam (see Spambot), click fraud, spamdexing and the theft of application serial numbers, login IDs, and financial information such as credit card numbers.

The botnet controller community features a constant and continuous struggle over who has the most bots, the highest overall bandwidth, and the most "high-quality" infected machines, like university, corporate, and even government machines.

Read more about this topic:  Botnet

Famous quotes containing the words formation and/or exploitation:

    The formation of an oppositional world view is necessary for feminist struggle. This means that the world we have most intimately known, the world in which we feel “safe” ... must be radically changed. Perhaps it is the knowledge that everyone must change, not just those we label enemies or oppressors, that has so far served to check our revolutionary impulses.
    Bell (c. 1955)

    The mother’s battle for her child—with sickness, with poverty, with war, with all the forces of exploitation and callousness that cheapen human life—needs to become a common human battle, waged in love and in the passion for survival.
    Adrienne Rich (20th century)