Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the genesis domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /usr/home/simondi1cknow/public_html/cknow.com/cms/wp-includes/functions.php on line 6114
Botnet - Computer Knowledge

Botnet

A botnet is a network of remote-controlled zombie computers.

Using Trojan Horse programs or worms/viruses, a person (often called a “botmaster” or “herder”) can inject malware into a user’s computer which opens a port to listen for commands; often via an IRC ChatWeb Popup channel. When the commands are received then the zombie computer (as they are called) executes its instructions which often involve sending out massive amounts of spam, copies of other malware, or popup advertising. The user of the zombie may not even be aware this is happening unless they notice a slowdown of their computer or a large amount of Internet activity.

Botnet

Botnets were slowly constructed during 2004 and 2005 (and continue to be constructed) using viruses and Trojans. In January 2006 Jeanson James Ancheta, a California 20-year-old, pled guilty to controlling a botnet via one IRC ChatWeb Popup channel while selling its services over a second channel. He is yet to be sentenced at this writing (sentencing is scheduled for May 2006). Ancheta used a modified version of the Trojan horse program “rxbot” to build his botnet.

Past activities for shutting down botnets involved targeting the spam and attempting to get people to clean their computers. This is a slow and often unproductive approach so the newest way of fighting botnets is to attack the control mechanism; generally the IRC channel being used to control the botnet. If the control is taken down then the individual bots sitting on user machines are ineffective. Of course, these computers could be recaptured for later use if the robot programming is sophisticated enough. And, other control mechanisms, not as easily found, could be used to control the bots.

Like all malware, there is a continuous war between the white and black hats.

Summary

  • Botnets are networks of compromised computers.
  • Botnets can be used for many things and are usually controlled via an IRC chat channel.
Up Arrow How Viruses Infect Up Arrow
Prior Page Next Page
Buffer Overflow Social Engineering