Botnet - Formation and Exploitation

Formation and Exploitation

This example illustrates how a botnet is created and used to send email spam.

  1. A botnet operator sends out viruses or worms, infecting ordinary users' computers, whose payload is a malicious application—the bot.
  2. The bot on the infected PC logs into a particular C&C server.
  3. A spammer purchases the services of the botnet from the operator.
  4. The spammer provides the spam messages to the operator, who instructs the compromised machines via the control panel on the web server, causing them to send out spam messages.

Botnets are exploited for various purposes, including denial-of-service attacks, creation or misuse of SMTP mail relays for spam (see Spambot), click fraud, spamdexing and the theft of application serial numbers, login IDs, and financial information such as credit card numbers.

The botnet controller community features a constant and continuous struggle over who has the most bots, the highest overall bandwidth, and the most "high-quality" infected machines, like university, corporate, and even government machines.

Read more about this topic:  Botnet

Famous quotes containing the words formation and/or exploitation:

    That for which Paul lived and died so gloriously; that for which Jesus gave himself to be crucified; the end that animated the thousand martyrs and heroes who have followed his steps, was to redeem us from a formal religion, and teach us to seek our well-being in the formation of the soul.
    Ralph Waldo Emerson (1803–1882)

    The only phenomenon with which writing has always been concomitant is the creation of cities and empires, that is the integration of large numbers of individuals into a political system, and their grading into castes or classes.... It seems to have favored the exploitation of human beings rather than their enlightenment.
    Claude Lévi-Strauss (b. 1908)