creating botnet

Creating Botnet in Kali Linux 2017 Step by Step

It's only fair to share...Digg thisShare on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInFlattr the authorShare on TumblrShare on VKShare on YummlyShare on RedditShare on StumbleUpon

creating botnet

Creating botnet

A botnet computer is a f Internet-connected devices used by a botnet owner to perform various tasks. Botnets can be used to perform Distributed Denial Of Service Attack, steal data, and send spam. It can also allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&C) software.[1] The word botnet is a combination of the words robot and network. The term is usually used with a negative or malicious connotation.

 

Botnets can compromise computers whose security defenses have been breached and control ceded to a third party. Each such compromised device, known as a “bot”, is created when a computer is penetrated by software from a malware (malicious software) distribution. The controller of a botnet is able to direct the activities of these compromised computers through communication channels formed by standards-based network protocolssuch as IRC and Hypertext Transfer Protocol (HTTP).[2]

Peer-to-peer

A peer-to-peer (P2P) network in which interconnected nodes (“peers”) share resources amongst each other without the use of a centralized administrative system

In response to efforts to detect and decapitate IRC botnets, bot herders have begun deploying malware on peer-to-peer networks. These bots may use digital signatures so that only someone with access to the private key can control the botnet.[5] See e.g. Gameover ZeuS and ZeroAccess botnet.

Newer botnets fully operate over P2P networks. Rather than communicate with a centralized server, P2P bots perform as both a command distribution server and a client which receives commands.[7] This avoids having any single point of failure, which is an issue for centralized botnets. creating botnet.

ALSO READ  Perform a Man in the Middle Attacks With Ettercap

 

Command and control

In the field of computer security, command and control (C&C) infrastructure consists of servers and other technical infrastructure used to control malware in general, and, in particular, botnets. Command and control servers may be either directly controlled by the malware operators run on hardware compromised by malware.

Fast-flux DNS is used as a way to make it difficult to track the control servers which change from day to day. Control servers may also hop from DNS domain to DNS domain, with domain generation algorithms. creating botnet.

 

Zombie computer

In computer science, a zombie computer is a computer connected to the Internet. Also, it is a computer that has been compromised by a hacker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies. A coordinated DDoS attack by multiple botnet machines also resembles a zombie horde attack. creating botnet.

Computers can be co-opted into a botnet when they execute malicious software. This can be accomplished by luring users into making a drive-by download, exploiting web browser vulnerabilities, or by tricking the user into running a Trojan horse program, which may come from an email attachment. This malware will typically install modules that allow the computer to be commanded and controlled by the botnet’s operator. After the software is downloaded, it will call home (send a reconnection packet) to the host computer. When the re-connection is made, depending on how it is written, a Trojan may then delete itself, or may remain present to update and maintain the modules. Many computer users are unaware that their computer is infected with bots.

ALSO READ  Sniffing Tutorial With Kali Linux 2017
It's only fair to share...Digg thisShare on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInFlattr the authorShare on TumblrShare on VKShare on YummlyShare on RedditShare on StumbleUpon