Thursday, June 21, 2012

Botnets Working Techniques And its Commands

A botnet is a collection of compromised computers, each of which is known as a 'bot', connected to the Internet. When a computer is compromised by an attacker, there is often code within the malware that commands it to become part of a botnet. The "botmaster" or "bot herder" controls these compromised computers via standards-based network protocols such as IRC and http

Types of attacks-

  • Denial-of-service attacks where multiple systems autonomously access a single Internet system or service in a way that appears legitimate, but much more frequently than normal use and cause the system to become busy.
  • Adware exists to advertise some commercial entity actively and without the user's permission or awareness, for example by replacing banner ads on web pages with those of another content provider.
  • Spyware is software which sends information to its creators about a user's activities – typically passwords, credit card numbers and other information that can be sold on the black market. Compromised machines that are located within a corporate network can be worth more to the bot herder, as they can often gain access to confidential information held within that company. There have been several targeted attacks on large corporations with the aim of stealing sensitive information, one such example being the Aurora botnet.
  • E-mail spam are e-mail messages disguised as messages from people, but are either advertising, annoying, or malicious in nature.
  • Click fraud is the user's computer visiting websites without the user's awareness to create false web traffic for the purpose of personal or commercial gain.
  • Access number replacements are where the botnet operator replaces the access numbers of a group of dial-up bots to that of a victim's phone number. Given enough bots taking part in this attack, the victim is constantly bombarded with phone calls attempting to connect to the internet. Having very little to defend against this attack, most are forced into changing their phone numbers (land line, cell phone, etc.).
  • Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.
  • Brute-forcing remote machines services such as FTP, SMTP and SSH.
  • The worm behavior. Some botnet are designed to infect other hosts automatically.
  • Scareware can install the virus or the virus can install a scareware. For example users can be forced to buy a rogue anti-virus to regain access to their computer.
  • Exploiting systems by using multiple identities such as multiple player at the same poker table and voting system such as music clip and contest.
Download This Source Codes-
By Project HackersGrp

Download 2- Botnet Commands  

>>Leave a comment..

>>Join our blog For mail Updates...


Amith said...

Very Well explained.. I liked that PDF you gave.. really informative..

Blogger said...

Quantum Binary Signals

Get professional trading signals sent to your cell phone daily.

Start following our signals right now & gain up to 270% daily.

Blogger said...

Want to join new affiliate networks?
Visit my affiliate directory to get the ultimate list of affiliate programs.

Terry Franks said...

Joyfulhackingmaster are the best when it comes to hacking. We pictured the best for you who actually needs our helps, be

careful of whom you contact to help you, We are special hackers which have is own ways of hacking that know body has ever

imagine in this hacking world with our spare idea we can hack anything. We are totally secured and your security comes

first. Hacking a website is a job for pro like Cyberwizard (Tyler) A-Change school grade. Bank jobs, flipping cash hack

and control any robot. B-Database hack. Remove criminal records. facebook hack. C-gmail hack D-whatsapp hack E-website

hack F-tracking calls G-online hacking lectures H-Cloning of phones I-online records changes J-Twitter hack K-retrival of

hacked social media accounts l- Hacking classes with legit certificate. ANY HACKING SERVICE. we are experienced hacker,

we are at your service we do not mistakes in our jobs, and we make all work successful our work is 100% guarantee. we are

here to put smile upon sad faces. contact Us at :JOYFULHACKINGMASTER @ GMAIL.COM

Text whatsapp: +1(317)7941276

hugo sam said...

Finding a true hacker could be almost an impossible task these days, but with the help of our over a decade survey you are 100% safe...
visit this site below so your not misled...Avoid being cheated, hire a VERIFIED HACKER only.

Post a Comment

Design by Secure Hackers