Botnet - Formation and Exploitation

Formation and Exploitation

This example illustrates how a botnet is created and used to send email spam.

  1. A botnet operator sends out viruses or worms, infecting ordinary users' computers, whose payload is a malicious application—the bot.
  2. The bot on the infected PC logs into a particular C&C server.
  3. A spammer purchases the services of the botnet from the operator.
  4. The spammer provides the spam messages to the operator, who instructs the compromised machines via the control panel on the web server, causing them to send out spam messages.

Botnets are exploited for various purposes, including denial-of-service attacks, creation or misuse of SMTP mail relays for spam (see Spambot), click fraud, spamdexing and the theft of application serial numbers, login IDs, and financial information such as credit card numbers.

The botnet controller community features a constant and continuous struggle over who has the most bots, the highest overall bandwidth, and the most "high-quality" infected machines, like university, corporate, and even government machines.

Read more about this topic:  Botnet

Famous quotes containing the words formation and/or exploitation:

    ... the mass migrations now habitual in our nation are disastrous to the family and to the formation of individual character. It is impossible to create a stable society if something like a third of our people are constantly moving about. We cannot grow fine human beings, any more than we can grow fine trees, if they are constantly torn up by the roots and transplanted ...
    Agnes E. Meyer (1887–1970)

    The only phenomenon with which writing has always been concomitant is the creation of cities and empires, that is the integration of large numbers of individuals into a political system, and their grading into castes or classes.... It seems to have favored the exploitation of human beings rather than their enlightenment.
    Claude Lévi-Strauss (b. 1908)