![]() Bots are specially written programs that can be programmed to perform actions at certain times or in certain situations. This type of botnet is controlled through IRC channels using a special software client. Botnets that control only one computer (zombie) based on its IP address. ![]() Based on their functionality we can differentiate between: These botnets provide a wide range of functionality, such as taking over the victim’s machine, stealing data on it, spying on the user activity by logging keystrokes or capturing screenshots, sending out spam messages to innocent recipients and also carrying out DDoS attacks. They allow controlling a large number of infected computers from a single computer (command and control or C&C server). Most of the botnets are designed for easy control and management. Based on the way they infect the victim’s machine (for example using an exploit kit, via a browser vulnerability, email spam, etc.).Based on the type of malware installed in the botnet’s Trojan horse.Based on how they are created (is it a custom or off-the-shelf botnet).Based on the way they are controlled (manually or automatically).Platforms are they targeting (Windows, Linux, etc.).They can be categorized by several different criteria, such as: The classification of botnets is not easy. 8 The Way They Infect the Victim’s Machine.
0 Comments
Leave a Reply. |