Ready to Start Your Career?

By: Antr4ck
August 21, 2016
Understanding How Botnets Work

By: Antr4ck
August 21, 2016

- Relaying spam for illegal trade or handling of information (eg stock market prices)
- Performing phishing operations
- Identifying and infecting other machines, spreading viruses and malware
- Participating in DDoS attacks (grouped)
- Generating abused clicks on an advertising links on a web page (click fraud)
- Capturing information on compromised machines (theft and resale of information)
- Harnessing the computing power of machines or performing computing operations including distributed password cracking
- Conducting illegal trade operations by managing the access to unauthorized product sales sites or counterfeit via fast-flux techniques (single or double-flow or RockPhish).
- Theft of bank cards - passwords
- Spam: to send more mail.
- DDoS: send more attacks on a server to do stop working.
- Bruteforcing: find a password quickly
- Infection: of machines (viruses, worms, Trojans ...)
- Installing rootkits
- Changing the system (changing the network filtering rules, disabling security tools, etc.)
- Auto-change (to change his signature)
- Deleting other malware that can disrupt the botnet
- Operating fault of the host system, etc.
- To exploit vulnerabilities that it will recognize;
- To use known or previously installed backdoors;
- To make brute force attacks, etc.