What is botnet? How botnet work exactly

What is Botnet? How Botnet works exactly!

Introduction

In this post, you will learn what is a botnet and how they work? And you will also learn the types of botnet attacks. I have already written a detailed post on what is a bot and how bot works, To read [ Click here].

What is botnet?

Botnet stand for robot and network. The cybercriminals send infected bots to the user’s computers and make the user’s device involve in a mass cyberattack is called a botnet. In other words, millions of malware affected devices will be in a network of cyberattacks is a botnet.

The aim of the cybercriminals to do a bot net attack is to steal data. A bot can be PC, MAC or mobile.

Also Read: What is Adware? How Adware they work!

How Botnet works

Botnets are created to repeated tasks very often and a single cybercriminal can’t do cyberattack on the biggest companies like Google and Microsoft. So, they need an Army to attack such bigger companies and these cyber criminals create malware and inject in random user’s computer.

The cybercriminals spread this malware by two methods. Firstly, installing software that is malicious or visiting a Malware infected site.

Now you knew how cybercriminals spread the Malware. And these bots have a herder bot that controls all other bots. The herder bot receives commands from the cybercriminal.

Three components make the Bot network;

  • Bot Master or cyber criminal
  • Control
  • Bots

Take a look at the below image on how a Bot networks;

Botnet Example

From the above image, we could clearly understand we need a botmaster to control the herder bot. The herder bot collects and send data received from the botmaster. The herder bot is like a mediator. And now these infected devices are ready to perform a DDoS attack.

Also Read: I have already written a post on what is Malware and different types.

Types of Botnet

There are two types of bot net;

  1. centralize model
  2. decentralized model

Centralize model

Centralize model bot network

From the above image, I can say the infected devices are not interconnected. And the commands to the bots straightly coming from command and control servers (C&CServer). In a centralized model, there is a high chance of getting caught. Because the command comes from a single source.

Decentralized model

We can call this method a decentralized or P2P method. In this method, there is a herder bot, but it behaves like a zombie computer, which means it behaves like other infected bots.

Decentralize model or P2P (Peer-to-peer bot network.

The above image is an example of decentralizing the Botnet.

Also Read: What is CAPTCHA? Difference between CAPTCHA Vs reCAPTCHA

What information does a botnet carry?

  • The botnet first reads your system data, and it can rewrite the system data.
  • Continuous monitoring of users data.
  • Gathers infected device users personal data.
  • Check any other connected devices for vulnerability.

Major Botnet Attacks Method

  1. Phishing method – This method is very old but still it works. The botnets spread many malicious e-mails to unknown users. If a human does it, he needs to compile the malware in a file and attach it with email, and he has to send to each user. But the botnet reduce the time.
  2. DDoS – Botnet are formed to do this cyberattack DDoS ( distributed denial of service). DDoS attack takes place by overloading a server and making them to crash and to this attack the cybercriminal need lots of users.
  3. Spamming – In this, method the criminal target users data. This method is target to website, forums, chat box etc.,

Also Read: What is CAPTCHA and how CAPTCHA work?

Also Read: How does a bar code work!

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions or brave browser to block ads. Please support us by disabling these ads blocker.Our website is made possible by displaying Ads hope you whitelist our site. We use very minimal Ads in our site

Refresh
Scroll to Top

玻璃钢生产厂家广东中庭商场美陈费用山东商场主题创意商业美陈报价商场动物美陈天津玻璃钢卡通雕塑厂家南宁抽象玻璃钢雕塑多少钱山东中庭商场美陈现价南通商场春季美陈本溪市玻璃钢雕塑玻璃钢古代人物雕塑设计无锡荆门玻璃钢卡通雕塑玻璃钢海洋雕塑企业排名河源玻璃钢雕塑制品酒店玻璃钢人物雕塑艺术摆件信阳玻璃钢商场美陈厂家电话江阴主题商场美陈大同玻璃钢卡通雕塑报价嘉峪关玻璃钢植物雕塑季节性商场美陈供应海拉尔玻璃钢雕塑厂家上海秋季商场美陈厂家直销玻璃钢大型莲花雕塑庆阳玻璃钢景观雕塑定做江苏玻璃钢雕塑哪家便宜绍兴玻璃钢雕塑摆件多少钱邯郸室外玻璃钢景观雕塑松溪玻璃钢花盆花器广东超市商场美陈厂家直销东营玻璃钢仿真水果雕塑厂家湖南怀化玻璃钢雕塑制作六安玻璃钢雕塑工程香港通过《维护国家安全条例》两大学生合买彩票中奖一人不认账让美丽中国“从细节出发”19岁小伙救下5人后溺亡 多方发声单亲妈妈陷入热恋 14岁儿子报警汪小菲曝离婚始末遭遇山火的松茸之乡雅江山火三名扑火人员牺牲系谣言何赛飞追着代拍打萧美琴窜访捷克 外交部回应卫健委通报少年有偿捐血浆16次猝死手机成瘾是影响睡眠质量重要因素高校汽车撞人致3死16伤 司机系学生315晚会后胖东来又人满为患了小米汽车超级工厂正式揭幕中国拥有亿元资产的家庭达13.3万户周杰伦一审败诉网易男孩8年未见母亲被告知被遗忘许家印被限制高消费饲养员用铁锨驱打大熊猫被辞退男子被猫抓伤后确诊“猫抓病”特朗普无法缴纳4.54亿美元罚金倪萍分享减重40斤方法联合利华开始重组张家界的山上“长”满了韩国人?张立群任西安交通大学校长杨倩无缘巴黎奥运“重生之我在北大当嫡校长”黑马情侣提车了专访95后高颜值猪保姆考生莫言也上北大硕士复试名单了网友洛杉矶偶遇贾玲专家建议不必谈骨泥色变沉迷短剧的人就像掉进了杀猪盘奥巴马现身唐宁街 黑色着装引猜测七年后宇文玥被薅头发捞上岸事业单位女子向同事水杯投不明物质凯特王妃现身!外出购物视频曝光河南驻马店通报西平中学跳楼事件王树国卸任西安交大校长 师生送别恒大被罚41.75亿到底怎么缴男子被流浪猫绊倒 投喂者赔24万房客欠租失踪 房东直发愁西双版纳热带植物园回应蜉蝣大爆发钱人豪晒法院裁定实锤抄袭外国人感慨凌晨的中国很安全胖东来员工每周单休无小长假白宫:哈马斯三号人物被杀测试车高速逃费 小米:已补缴老人退休金被冒领16年 金额超20万

玻璃钢生产厂家 XML地图 TXT地图 虚拟主机 SEO 网站制作 网站优化