Bots & Botnets

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 2: Line 2:
== Definitions ==  
== Definitions ==  
 +
*Bot
 +
*Herder
 +
*Scrumping
===Bot===
===Bot===
===Herder===
===Herder===
===Zombie===
===Zombie===
===Scrumping===
===Scrumping===
-
== Attacks ==  
+
== Attacks ==
 +
*DDoS
 +
*Spamming
 +
*Phishing
===DDoS===
===DDoS===
===Spamming===
===Spamming===
-
===phishing===
+
===Phishing===
== Life Cycle ==  
== Life Cycle ==  
-
 
+
*Intial setup of configuration settings of the bot
 +
*Register a Dynamic DNS
 +
*Infect a PC with a bot
 +
**Bot propagates according to the configuration settings
 +
**Scans for vunerabilities
 +
**Idle
 +
**Performs actions as recieved by other bots above it in the chain of command
 +
**Bot dies:
 +
***Bot may be taken over by another botnet
 +
***The bot's owner's pc realizes the pc is a zombie, kills the bot.
 +
***The chain of command may be compromised above the level.
== Bot Management ==
== Bot Management ==

Revision as of 21:28, 13 April 2008

insert description here

Contents

Definitions

  • Bot
  • Herder
  • Scrumping

Bot

Herder

Zombie

Scrumping

Attacks

  • DDoS
  • Spamming
  • Phishing

DDoS

Spamming

Phishing

Life Cycle

  • Intial setup of configuration settings of the bot
  • Register a Dynamic DNS
  • Infect a PC with a bot
    • Bot propagates according to the configuration settings
    • Scans for vunerabilities
    • Idle
    • Performs actions as recieved by other bots above it in the chain of command
    • Bot dies:
      • Bot may be taken over by another botnet
      • The bot's owner's pc realizes the pc is a zombie, kills the bot.
      • The chain of command may be compromised above the level.

Bot Management

How to Fight Botnets

References

"Botnet"

See Also

"Alternative Technologies for Ethernet"

External Links

Personal tools