際際滷

際際滷Share a Scribd company logo
Botnets
MONSTERS OF INTERNET
By : Vishwadeep C. Badgujar | Jalgaon
What is a Bot ( Bot/Botnets/Zombies)
 The word bot comes from Robot
 A network of private computers/devices
infected with malicious software and
controlled as a group without the owners'
knowledge.
Recent news about bot attacks
BBC website crashed using 300 gbps ddos attacks
Pokemongo game website crashed using
200 gbps ddos attacks
ISPs in Maharashtra are facing DDoS attack
Botnet  25,000 CCTV Cameras Hacked
to launch Ddos Attack
Interesting facts - Bots
60% internet traffic consume by bot worldwide
Group of Bots can crack 1 TB password file into
10 hours , Single computer takes 10 years
 There are two main Communication Protocols used for bot attacks:
 IRC
 HTTP
IRC Protocol
 IRC Botnets are the predominant version
 IRC mainly designed for one to many conversations
but can also handle one to one
 Most corporate networks due not allow any IRC
traffic so any IRC requests can determine and
external or internal bot
 Outbound IRC requests means an already infected computer on the network
 Inbound IRC requests mean that a network computer is being recruited
HTTP Protocol
 Due to prevalence of HTTP usage it is harder to track a botnet that uses
HTTP Protocols
 Using HTTP can allow a botnet to skirt the firewall restrictions that hamper
IRC botnets
 Detecting HTTP botnets is harder but not impossible since the header
fields and the payload do not match usual transmissions
 Some new options emerging are IM and P2P protocols and expect growth
here in the future
HTTP Botnet Example:
Fast-flux Networks
 Commonly used scheme
 Used to control botnets w/ hundreds or even thousands of nodes
C&C Centralized Model Example
3 Steps of Authentication
a. Bot to IRC Server
b. IRC Server to Bot
c. Botmaster to Bot
bots : How exactly work
Suppose attacker have hash file containing important password. And
attacker have one 1 Tb file for password cracking.
He spilt this file into 10000 segments
Wordlist file ( Size 1 TB )
First attacker Spreads bot in vulnerable devices like routers and cctvs.
( most of the cctv are vulnerable coz of default username and passwords)
C & C
C & C
 Attacker setup C&C server first, then spread bot using C&C server
( Attacker always use Proxy Ip )
 Then bots send to vulnerable devices.
 Then Attacker sends password file segments to bots ( approx each 1 Gb )
 Now attackers needs to send command for cracking , As soon as command sends
every bots start working for cracking Hash file.
 Single computer needs 1 years to crack 1 Tb file
 So 10000 computer or devices proportionally need 10 hours (approx).
bots : How exactly work
what can botnets do
 Distributed Denial-of-Service Attacks
 Sniffing Traffic
 Keylogging
 Spreading new malware
 Installing Advertisement Addons
 Attacking IRC Chat Networks
 Create fake website visitors
 Manipulating online polls/games
Common bot attacks
Denial-of-service
Another popular use of a bot, denial-of-service attacks look to invade a network or
an Internet service provider, usually by stealth, in order to disrupt or cripple service.
Here, the attacker tries to get as many computers infected as possible in order to
have a bigger botnet network.
Spyware
Spyware is any malware that can be used to gain information from its target
or targets, anything from passwords and credit card information to the
physical data contained within files. These can be lucrative to a bot herder,
as they can sell the data on the black market. If a bot herder gains control
of a corporate network, these can be all the more lucrative, as they may be
able to sell the rights to their bank accounts and their intellectual
property.
Click fraud
his form of remote control can allow a bot herder to surreptitiously click
links on Web sites and online advertising, bolstering numbers for
advertisers and producing more money.
Wordlist bruteforce
This type of bot work for cracking passwords using bruteforce methods
Prevention Against Bots
 Use best Antivirus software ( Norton/Avast/Avg) and take precautions for
auto updates
 Always use and enable firewall software
 Update ur operating system regularly
 Update ur routers regularly
 Malwarebytes is best software for bots detections
Institute for Advanced Hacking & Cyber Crime Investigation

More Related Content

What's hot (20)

Cyber ppt
Cyber pptCyber ppt
Cyber ppt
Mandar Pathrikar
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
Network Security
Network SecurityNetwork Security
Network Security
forpalmigho
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
yogendra singh chahar
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
Cyber security
Cyber security Cyber security
Cyber security
Shivam Yadav
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
srivijaymanickam
Denial of service
Denial of serviceDenial of service
Denial of service
garishma bhatia
Botnets In Cyber Security
Botnets In Cyber SecurityBotnets In Cyber Security
Botnets In Cyber Security
sumit saurav
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
amit kumar
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
gr9293
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
Ransomware
RansomwareRansomware
Ransomware
Akshita Pillai
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
Network Security
Network SecurityNetwork Security
Network Security
forpalmigho
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
Cyber security
Cyber security Cyber security
Cyber security
Shivam Yadav
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
srivijaymanickam
Botnets In Cyber Security
Botnets In Cyber SecurityBotnets In Cyber Security
Botnets In Cyber Security
sumit saurav
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
amit kumar
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
gr9293
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela

Similar to Botnets (20)

Botnet
BotnetBotnet
Botnet
prisonbreak4950
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about Botnet
Naveen Titare
Botnet
BotnetBotnet
Botnet
Joshin Gomez
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
OWASP Delhi
Bots and Botnet
Bots and BotnetBots and Botnet
Bots and Botnet
Hicube Infosec
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1
Aniq Eastrarulkhair
unit cyber security BOTNETS Documents.pptx
unit  cyber security  BOTNETS Documents.pptxunit  cyber security  BOTNETS Documents.pptx
unit cyber security BOTNETS Documents.pptx
vishal2226it1214
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
London School of Cyber Security
098
098098
098
Arun Mishra
Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
Vi T鱈nh Hong Nam
botnet.ppt
botnet.pptbotnet.ppt
botnet.ppt
KiranKumar24546
Bots and malware
Bots and malwareBots and malware
Bots and malware
Doron Segal
Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And Alife
Zotronix
BOTNETS
BOTNETSBOTNETS
BOTNETS
Arjo Ghosh
BOTLAB excersise
BOTLAB excersiseBOTLAB excersise
BOTLAB excersise
Anthony Stamm
Botnet Architecture
Botnet ArchitectureBotnet Architecture
Botnet Architecture
Bhagath Singh Jayaprakasam
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Jishnu Pradeep
A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
UltraUploader
Detection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsDetection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P Botnets
CSCJournals
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
Andr辿 Fucs de Miranda
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about Botnet
Naveen Titare
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
OWASP Delhi
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1
Aniq Eastrarulkhair
unit cyber security BOTNETS Documents.pptx
unit  cyber security  BOTNETS Documents.pptxunit  cyber security  BOTNETS Documents.pptx
unit cyber security BOTNETS Documents.pptx
vishal2226it1214
Bots and malware
Bots and malwareBots and malware
Bots and malware
Doron Segal
Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And Alife
Zotronix
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Jishnu Pradeep
A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
UltraUploader
Detection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsDetection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P Botnets
CSCJournals
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
Andr辿 Fucs de Miranda

Recently uploaded (14)

Here are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCPHere are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCP
glcppro
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
TANGKI4D
phase_4_presentation[1] - Read-Only.pptx Iot
phase_4_presentation[1]  -  Read-Only.pptx Iotphase_4_presentation[1]  -  Read-Only.pptx Iot
phase_4_presentation[1] - Read-Only.pptx Iot
harshithamandya49
Building a Multiplatform SDKMAN in JavaFX.pdf
Building a Multiplatform SDKMAN in JavaFX.pdfBuilding a Multiplatform SDKMAN in JavaFX.pdf
Building a Multiplatform SDKMAN in JavaFX.pdf
Jago de Vreede
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
CartCoders
3d animation3d animation3d animation3d animation
3d animation3d animation3d animation3d animation3d animation3d animation3d animation3d animation
3d animation3d animation3d animation3d animation
animationkeemo21
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to beHygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
LoveJade1
A Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beachA Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beach
sethiserena
cyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online moneycyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online money
VEENAKSHI PATHAK
APNIC Update, presented by Joyce Chen at APTLD 87
APNIC Update, presented by Joyce Chen at APTLD 87APNIC Update, presented by Joyce Chen at APTLD 87
APNIC Update, presented by Joyce Chen at APTLD 87
APNIC
10 Critical Skills Kids Need in the AI Era
10 Critical Skills Kids Need in the AI Era10 Critical Skills Kids Need in the AI Era
10 Critical Skills Kids Need in the AI Era
RachelDines1
What Is the Difference Between the Internet and WAN.pdf
What Is the Difference Between the Internet and WAN.pdfWhat Is the Difference Between the Internet and WAN.pdf
What Is the Difference Between the Internet and WAN.pdf
Internet Bundle Now
QasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartupQasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartup
AidarIsakhanov
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
APNIC
Here are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCPHere are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCP
glcppro
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
TANGKI4D
phase_4_presentation[1] - Read-Only.pptx Iot
phase_4_presentation[1]  -  Read-Only.pptx Iotphase_4_presentation[1]  -  Read-Only.pptx Iot
phase_4_presentation[1] - Read-Only.pptx Iot
harshithamandya49
Building a Multiplatform SDKMAN in JavaFX.pdf
Building a Multiplatform SDKMAN in JavaFX.pdfBuilding a Multiplatform SDKMAN in JavaFX.pdf
Building a Multiplatform SDKMAN in JavaFX.pdf
Jago de Vreede
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
CartCoders
3d animation3d animation3d animation3d animation
3d animation3d animation3d animation3d animation3d animation3d animation3d animation3d animation
3d animation3d animation3d animation3d animation
animationkeemo21
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to beHygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
LoveJade1
A Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beachA Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beach
sethiserena
cyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online moneycyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online money
VEENAKSHI PATHAK
APNIC Update, presented by Joyce Chen at APTLD 87
APNIC Update, presented by Joyce Chen at APTLD 87APNIC Update, presented by Joyce Chen at APTLD 87
APNIC Update, presented by Joyce Chen at APTLD 87
APNIC
10 Critical Skills Kids Need in the AI Era
10 Critical Skills Kids Need in the AI Era10 Critical Skills Kids Need in the AI Era
10 Critical Skills Kids Need in the AI Era
RachelDines1
What Is the Difference Between the Internet and WAN.pdf
What Is the Difference Between the Internet and WAN.pdfWhat Is the Difference Between the Internet and WAN.pdf
What Is the Difference Between the Internet and WAN.pdf
Internet Bundle Now
QasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartupQasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartup
AidarIsakhanov
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
APNIC

Botnets

  • 1. Botnets MONSTERS OF INTERNET By : Vishwadeep C. Badgujar | Jalgaon
  • 2. What is a Bot ( Bot/Botnets/Zombies) The word bot comes from Robot A network of private computers/devices infected with malicious software and controlled as a group without the owners' knowledge.
  • 3. Recent news about bot attacks
  • 4. BBC website crashed using 300 gbps ddos attacks
  • 5. Pokemongo game website crashed using 200 gbps ddos attacks
  • 6. ISPs in Maharashtra are facing DDoS attack
  • 7. Botnet 25,000 CCTV Cameras Hacked to launch Ddos Attack
  • 9. 60% internet traffic consume by bot worldwide
  • 10. Group of Bots can crack 1 TB password file into 10 hours , Single computer takes 10 years
  • 11. There are two main Communication Protocols used for bot attacks: IRC HTTP
  • 12. IRC Protocol IRC Botnets are the predominant version IRC mainly designed for one to many conversations but can also handle one to one Most corporate networks due not allow any IRC traffic so any IRC requests can determine and external or internal bot Outbound IRC requests means an already infected computer on the network Inbound IRC requests mean that a network computer is being recruited
  • 13. HTTP Protocol Due to prevalence of HTTP usage it is harder to track a botnet that uses HTTP Protocols Using HTTP can allow a botnet to skirt the firewall restrictions that hamper IRC botnets Detecting HTTP botnets is harder but not impossible since the header fields and the payload do not match usual transmissions Some new options emerging are IM and P2P protocols and expect growth here in the future
  • 14. HTTP Botnet Example: Fast-flux Networks Commonly used scheme Used to control botnets w/ hundreds or even thousands of nodes
  • 15. C&C Centralized Model Example 3 Steps of Authentication a. Bot to IRC Server b. IRC Server to Bot c. Botmaster to Bot
  • 16. bots : How exactly work
  • 17. Suppose attacker have hash file containing important password. And attacker have one 1 Tb file for password cracking.
  • 18. He spilt this file into 10000 segments Wordlist file ( Size 1 TB )
  • 19. First attacker Spreads bot in vulnerable devices like routers and cctvs. ( most of the cctv are vulnerable coz of default username and passwords) C & C C & C
  • 20. Attacker setup C&C server first, then spread bot using C&C server ( Attacker always use Proxy Ip ) Then bots send to vulnerable devices. Then Attacker sends password file segments to bots ( approx each 1 Gb ) Now attackers needs to send command for cracking , As soon as command sends every bots start working for cracking Hash file. Single computer needs 1 years to crack 1 Tb file So 10000 computer or devices proportionally need 10 hours (approx). bots : How exactly work
  • 21. what can botnets do Distributed Denial-of-Service Attacks Sniffing Traffic Keylogging Spreading new malware Installing Advertisement Addons Attacking IRC Chat Networks Create fake website visitors Manipulating online polls/games
  • 23. Denial-of-service Another popular use of a bot, denial-of-service attacks look to invade a network or an Internet service provider, usually by stealth, in order to disrupt or cripple service. Here, the attacker tries to get as many computers infected as possible in order to have a bigger botnet network.
  • 24. Spyware Spyware is any malware that can be used to gain information from its target or targets, anything from passwords and credit card information to the physical data contained within files. These can be lucrative to a bot herder, as they can sell the data on the black market. If a bot herder gains control of a corporate network, these can be all the more lucrative, as they may be able to sell the rights to their bank accounts and their intellectual property.
  • 25. Click fraud his form of remote control can allow a bot herder to surreptitiously click links on Web sites and online advertising, bolstering numbers for advertisers and producing more money.
  • 26. Wordlist bruteforce This type of bot work for cracking passwords using bruteforce methods
  • 27. Prevention Against Bots Use best Antivirus software ( Norton/Avast/Avg) and take precautions for auto updates Always use and enable firewall software Update ur operating system regularly Update ur routers regularly Malwarebytes is best software for bots detections
  • 28. Institute for Advanced Hacking & Cyber Crime Investigation