Botnet Overview



Botnets are built and programmed by programmers, quite infamously known as "Botnet herders", as malicious software and then sent in large numbers to PC's all over the servers existing in the world, which then get distributed through these servers. After the Botnet acquires the PC, the PC comes under the control of the Botnet herder. He may utilize that PC, according to his will, without requiring any knowledge from the original user.

A bot herder will "rent" the services of the botnet out to third parties, usually for sending out spam messages, or for performing a DDoS attack against a remote target. Due to the large numbers of compromised machines within the botnet, huge volumes of traffic (either email or denial of service) can be generated. Botnets are also a popular tool for identity and password theft, allowing them to steal from personal bank accounts.

The main features of the most successful Botnets are that they integrate within themselves very quickly and the possibility of locating a Botnet herder becomes very difficult. However, the most dangerous feature of these Botnets is that they can easily detect anyone trailing or tracing them and then DDoS attack that person or server, making them nearly impossible to track and catch.

Kraken.jpg
Diagram http://tinyurl.com/2uff4wq