IT | The Botnet Army Attacks, Explained

This article covers sophisticated botnet attacks, whereby the attacked computer system becomes an attacker itself. Systems administrators and senior technology management staff that are aware of the modus operandi of botnets are best qualified to prevent their entry into a secured network. The article also discusses how FOSS systems ought to be protected from such attacks.

By Prashant Pathak

IT | The Botnet Army Attacks, Explained


The word botnet is derived from a network of robots. It is essentially a widespread collection of a large number of infected computer systems. Each infected system runs a piece of software program called a bot. As shown in Figure 1, there is a bot-master system, which keeps track of the total number of machines infected and the tasks they should perform. For carefully choreographed attacks that need orchestration between millions of such systems, another layer of bot-managers is created too. These perform the tasks of accepting commands from the master, spreading those commands to the bots, and also reporting the number of infected systems under them. The manager botnets also send software patches to fix bugs or improve functionality, very similar to a security patch management system.

The bot-masters are controlled by the crackers who created this army. However, since the crackers are in hiding, the master system and software running on it are always operating in stealth mode. In a few recent botnet attacks, the bot-master had delegated and rotated the master’s role between its bot-managers, thus making it extremely tough to detect. These role changes were further rotated based on the country they were present in. Usually, botnets are designed for a specific OS, and if they have to spread wider, botnets prefer Web code or the Java language to infect all possible OS platforms.

Now, let’s look into the internal operations of a typical bot. As shown in Figure 2, there are four main modules of a botnet. The command module sends commands to the child botnets, whereas the control module controls the ownerships, to decide who should listen to whom. The infection module carries the important responsibility of finding non-patched servers in the network, and infecting those with the most updated copy. The stealth module is essentially a set of software programs, which does crucial jobs such as disabling anti-virus software, achieving root access or kernel access, etc. It also ensures that its own footprint on the infected machine is invisible in terms of running processes and disk space, and also keeps a watch on new anti-virus software being installed. In some cases, the stealth module and control module work together to fetch their most recent patch from the master or manager, and seamlessly upgrade themselves. Some stealth modules are also capable of erasing themselves with a self-destruct mechanism, or shutting down the system to thwart aggressive detection techniques.

The way botnets interact with the master or manager is very interesting too. All bots are given a unique identification number, which is usually a product of the infected system’s configuration and location, but not necessarily the IP address of the system. The master always has the most updated count of the identification numbers used, and is capable of limiting or expanding the spread. Bots use a specific range of TCP ports; however, the exact port being used is picked randomly. It is always the duty of the botnet to report to the master or manager the TCP port number it plans to use. This reporting occurs on every reboot of the infected system. In most cases, the inter-bot communications are Base-64 or MD5 encrypted, while in some cases a self-signed digital certificate is used too.

Typical Botnet Architecture

The main purpose behind injecting a botnet into a system is to create an army of infected systems, also called zombies. The table below explains various types of botnets and the purpose behind injecting them into a network. The overall purpose behind such an attack is, ultimately, to disrupt computer systems or to steal data. Since a whole army of computer zombies are in action, unfortunately, the crackers can easily and quickly succeed in their evil mission; this is because planting a botnet attack is always a low-risk, high-profit job.

Botnet type    Purpose
DoSBot        DoS and Distributed DoS attack using Layer 3 to 7 protocols
SpamBot        Email spamming by collecting address books
BrowseBot    Gather user’s browsing trends and feed into advertisement network
AdSenseBot    Same as BrowseBot but targeted at Google AdSense
ChatBot        Collect chat transcripts to find user’s chatting trends
idBot        Collect user ID and password information
CCBot        Collect credit-card information from e-commerce portal screens
PollBot        Manipulate online polls meant for products and services
BruteForceBot    Attack websites with TCP and application layer attacks
NetBot        Attack networks using Layer 2 and 3 protocols

How botnets are injected

In the early days of the Internet, a botnet code piece was developed to programmatically traverse through multiple websites, and to further gather and collate the contents to create meaningful data. While this method forms the heart of today’s search engines, it was tweaked at some point in the past by crackers to serve their purposes. Before discussing how botnets are injected, let’s understand why it is done. To make a website famous in a search engine, it is imperative to get lots of Web requests. This is especially true for websites that run advertisements and earn money for every click on a published advertisement. It is now possible to spread botnets across the networks, to access the page and programmatically click one or more advertisements on it. If such a campaign is carefully orchestrated, it is tough to figure out which click is legitimately initiated by a human being, and which one originates from botnet code. The website hosting firm, usually a cracker in such a case, can end up earning lots of money. In another type of attack called phishbots, an email campaign can be started to achieve similar results. This tells us that the effects of botnets go much beyond mere reputation or data loss.

Injecting a botnet is usually a very well-thought-out and strategic approach taken by the cracker. The process usually starts by infecting one or more systems, which are then responsible for replicating the malicious code in other machines, and eventually they cross the boundaries of the network to spread the infection to a wider global arena. In order to infect one system, the attacker needs to rely on multiple methods of intrusion. A very commonly used option is to lure a browser to a website with malicious JavaScript code, or a page written in a low-level scripting language such as Python. This script is merely a bootstrap, which executes and creates a stealth resource space on the machine. The script then connects to one or more Web pages of the same website, which contain the real payload of a botnet. The payload files are then downloaded and kept hidden under a stealth space. This payload contains all the modules explained above, which take control of the machine, and the machine is said to be infected at this point. Enhanced botnets do not require the machine to be rebooted, and are capable of turning the machine into a zombie the moment they are downloaded. Another famous injection method is to put the botnet’s malicious code in the form of installable files on a USB drive, and inject the code on a machine that allows easy physical access and is vulnerable or insecure. There are a few advanced methods, such as forcing a user to run a script sent as an attachment, or hiding the code in a music file and distributing it using peer-to-peer shares.

The process mentioned above is only possible when enough security measures are not in place. For example, a machine not running anti-virus software, or running with old or dated anti-virus definitions can fall prey to this process easily. Similarly, an un-patched or improperly patched system or network can expose a lot of vulnerabilities that can be exploited. In case of the network perimeter defence, leaving security holes in a firewall configuration worsens the situation. As for servers, implementing insecure policies or measures that do not harden the server OS, or leaving application exploits unfixed, can cause damage. While dealing with Linux distros, exploits such as buffer overflows and remote command execution are usually used. Typical rudimentary methods such as sending phishing emails, spyware attachments, etc, are used to increase the spread. It is very important to remember that infecting one machine in a network is enough, because that machine, acting as a zombie, can easily replicate the botnet code to other machines in the same network.

Famous botnets

At this point, it is important to mention a few notorious botnets that are still tough to detect.

Conficker: Originally thought to be a virus, Conficker had built-in software routines that could allow the infected machine to be controlled remotely, making it a bot threat. While it was written for Windows OS, a few variants were later created to infect UNIX and Linux systems too. It used the hidden file share vulnerability of Windows to get into the machine, and then turn it into a zombie to spread the infection further. With an infection count of over 10 million machines across the globe, Conficker is still found in systems that are improperly configured, or not protected by a strong perimeter defence system.

Mariposa: This botnet used spyware and malware as a vehicle to inject machines and install a payload of command and control centre modules. The purpose of Mariposa was to run in stealth mode, and keep an eye on passwords and credit card numbers being typed on the machine. It was also programmed to intercept browser requests and lure users to pages hosting updated copies of the botnet itself, as well as advertisement pages.

Srizbi: This botnet was specifically designed to create billions of spam email messages every day. It spread mainly via pirated and free software downloaded on the Net, turning multiple machines into zombies. It had a very small footprint, which made detection very difficult. It had a different control module by which an infected server would be the owner controlling the zombie army, while other infected servers simply kept a watch on it, and would take over if the controller server failed or shut down. Srizbi is known to have created massive email spam attacks, causing denial of service on mail servers.

BredoLab: This is the most recent botnet army, which infected over 20 million machines worldwide. While the main purpose was to create massive email spam, this botnet also incorporated spyware and viruses in its payload. It is known to infect various Linux distros, and deploy root-kits on those to run in stealth mode. It was dismantled by law authorities, but is believed to still exist in the form of variants.

Protecting FOSS systems

As we learnt, botnets exploit all possible vulnerabilities and create their own eco-system for malicious purposes. While botnets are difficult to detect and tackle, there are a few preventive mechanisms that all network administrators should adopt in their infrastructure. The first and foremost is the perimeter defence system. A properly configured router and firewall must be in place, and the firewall should be configured with auto-updating anti-spam filters. As for physical security, disabling USB and CD drives would help to a great extent. It is important for Linux administrators to know that Linux distros are not secure from botnets, though the percentage of infection is somewhat lower than Windows machines. For FOSS systems, performing a rigorous routine check for root kits and malware is a must. Linux systems, which typically host Web servers and FTP farms, are usually the first targets to deploy the payload. Strengthening and locking file systems is advised too.


Attackers who plan to inject a botnet can use simple methods of breaking into authentication systems, via SSH protocol or over the Web. Thus, using a strict and complex password scheme is very important. The common practice of running unnecessary services on a production Linux server should be discouraged, as it opens up stray ports that are left unmonitored and thus become a back-door for attackers. Just to summarize, cyber security is all about processes and practices, rather than just products. Hence, understanding how botnets attack is imperative for systems administrators to devise a security strategy based on their particular network scenarios. 

About The Author:

Prashant Pathak has experience of over 20 years in the field of IT hardware, networking, Web technologies and IT security. For the past 11 years, he has worked at Merrill Lynch, New York. He handled technology verticals such as solution architecture, operations and support, cyber security etc., and led a global team supporting mission-critical business applications running on a finance trading platform. Recently, Prashant started his own firm, Valency Networks, in India.

 
 This article was released under Creative Commons Attribution-NonCommercial 3.0 Unported License by the original publisher – OpenSource4u
Name

-51,1,3D Technology,2,5G,8,Abkhazia,2,Academics,9,Accidents,19,Activism,1,ADB,12,ADIZ,1,Adults,1,Advertising,30,Advisory,1,Aerial Reconnaissance,11,Aerial Warfare,34,Aerospace,4,Afghanistan,83,Africa,108,Agile Methodology,2,Agriculture,15,Air Crash,9,Air Defence Identification Zone,1,Air Defense,5,Air Force,26,Air Pollution,1,Airbus,4,Aircraft Carriers,5,Aircraft Systems,1,Al Nusra,1,Al Qaida,4,Al Shabab,1,ALBA,1,Albania,2,Algeria,3,American History,4,AmritaJash,10,Antarctic,1,Anthropology,7,Anti Narcotics,11,Anti Tank,1,Anti-Corruption,3,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,1,APEC,1,Apple,2,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,1,Arctic,6,Argentina,7,Armenia,26,Army,3,Art,1,Artificial Intelligence,62,Arunachal Pradesh,1,ASEAN,10,Asia,64,Asia Pacific,22,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,7,Australia,43,Austria,1,Automation,13,Automotive,124,Autonomous Flight,2,Autonomous Vehicle,2,Aviation,58,AWACS,1,Awards,17,Azerbaijan,14,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,1,Balance of Trade,3,Balkan,10,Baltic,3,Baluchistan,8,Bangladesh,27,Banking,48,Bankruptcy,1,Basel,1,Bashar Al Asad,1,Bay of Bengal,5,BBC,1,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,9,Big Data,30,Big Tech,1,Bilateral Cooperation,13,BIMSTEC,1,Biography,1,Biotechnology,2,BISA,1,Bitcoin,7,Black Lives Matter,1,Black Money,2,Black Sea,1,Blockchain,31,Blood Diamonds,1,Bloomberg,1,Boeing,20,Boko Haram,7,Bolivia,6,Bomb,2,Bond Market,1,Book,10,Book Review,17,Border Conflicts,7,Border Control and Surveillance,5,Bosnia,1,Brand Management,14,Brazil,99,Brexit,22,BRI,5,BRICS,16,British,3,Broadcasting,16,Brunei,2,Brussels,1,Buddhism,1,Budget,3,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,993,C-UAS,1,California,4,Call for Proposals,1,Cambodia,6,Cameroon,1,Canada,46,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,8,CAREC,1,Caribbean,9,CARICOM,1,Caspian Sea,2,Catalan,3,Caucasus,9,CBRN,1,Central African Republic,1,Central Asia,74,Central Asian,3,Central Eastern Europe,46,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,1,Chemicals,7,Child Labor,1,Children,4,Chile,10,China,451,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,1,Civil Liberties,4,Civil Rights,2,Civil Society,4,Civilization,1,Clean Energy,4,Climate,62,Climate Change,14,Clinical Research,3,Clinton,1,Cloud Computing,40,Coal,4,Coast Guard,3,Cognitive Computing,12,Cold War,4,Colombia,15,Commodities,3,Communication,8,Communism,3,Compliance,1,Computers,40,Conferences,1,Conflict,80,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,1,Construction,4,Consumer Behavior,4,Consumer Price Index,1,COP26,4,Coronavirus,106,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,13,Counter Terrorism,80,COVID,5,COVID Vaccine,5,CPEC,8,CPG,3,Credit,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,12,Cryptography,1,CSTO,1,Cuba,6,Culture,4,Currency,6,Customer Relationship Management,1,Cyber Attack,6,Cyber Crime,2,Cyber Security & Warfare,104,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,35,Data Science,2,Database,2,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,11,Decision Support System,5,Defense,9,Defense Deals,5,Deforestation,2,Democracy,20,Democrats,2,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,38,Digital Economy,8,Digital Marketing,2,Digital Transformation,10,Diplomacy,10,Disaster Management,4,Disinformation,1,Diversity & Inclusion,1,Djibouti,2,Documentary,2,Doklam,1,Dokolam,1,Dominica,2,Donald Trump,42,Donetsk,2,Dossier,2,Drones,10,E-Government,2,E-International Relations,1,Earning Reports,2,Earth Science,1,Earthquake,5,East Africa,1,East China Sea,9,eBook,1,ECB,1,eCommerce,11,Econometrics,1,Economic Justice,1,Economics,38,Economy,75,ECOWAS,2,Ecuador,3,Edge Computing,2,Education,60,Egypt,24,Elections,28,Electric Vehicle,11,Electricity,5,Electronics,7,Emerging Markets,1,Employment,12,Energy,308,Energy Policy,27,Energy Politics,24,Engineering,23,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,45,ePayments,12,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,3,Eurasia,3,Euro,6,Europe,5,European Union,219,EuroZone,5,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,3,F-35,5,Facebook,7,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1136,Fidel Castro,1,Fiji,1,Finance,17,Financial Markets,49,Financial Statement,2,Finland,5,Fintech,13,Fiscal Policy,12,Fishery,3,Food Security,22,Forces,1,Forecasting,1,Foreign Policy,12,Forex,2,France,26,Free Market,1,Free Syrian Army,4,Freedom,3,Freedom of Speech,1,FTC,1,Fujairah,97,Fund Management,1,Funding,22,Future,1,G20,6,G24,1,G7,3,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,14,GATT,1,Gaza,2,GCC,11,GDP,8,GDPR,1,Geneal Management,1,General Management,1,Geo Politics,103,Geography,1,Geoint,14,Geopolitics,5,Georgia,11,Georgian,1,geospatial,8,Geothermal,2,Germany,59,Ghana,3,Gibratar,1,Gig economy,1,Global Trade,88,Global Warming,1,Global Water Crisis,10,Globalization,2,Gold,2,Google,13,Gorkhaland,1,Government,125,GPS,1,Greater Asia,125,Greece,12,Green Bonds,1,Greenland,1,Gross Domestic Product,1,GST,1,Gujarat,6,Gun Control,4,Hacking,4,Haiti,2,Hasan,1,Health,7,Healthcare,71,Heatwave,1,Helicopter,10,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,11,Houthi,11,Howitzer,1,Human Development,28,Human Resource Management,5,Human Rights,4,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,2,IAEA,2,ICBM,1,Iceland,1,ICO,1,Identification,2,IDF,1,Imaging,2,IMF,68,Immigration,17,Impeachment,1,Imran Khan,1,Independent Media,72,India,536,India's,1,Indian Air Force,18,Indian Army,5,Indian Nationalism,1,Indian Navy,24,Indian Ocean,16,Indices,1,Indo-Pacific,3,Indonesia,17,IndraStra,1,Industrial Accidents,3,Industrial Automation,2,Industrial Safety,4,Inflation,5,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,7,Internet,52,Internet of Things,34,Interview,8,Intra-Government,5,Investigative Journalism,3,Investment,32,Investor Relations,1,IPO,4,Iran,186,Iraq,52,IRGC,1,Iron & Steel,1,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,119,IT ITeS,131,Italy,10,Jabhat al-Nusra,1,Jamaica,3,Japan,61,JASDF,1,Jihad,1,Joe Biden,3,Joint Strike Fighter,4,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kazakhstan,22,Kenya,5,Kiev,1,Kindle,700,Knowledge Management,3,Kosovo,2,Kurdistan,8,Kurds,10,Kuwait,6,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,2,Land Warfare,21,Languages,1,Laos,1,Laser Defense Systems,1,Latin America,79,Law,5,Leadership,3,Lebanon,9,Legal,9,LGBTQ,1,Liberalism,1,Library Science,1,Libya,12,Littoral Warfare,2,Livelihood,3,Loans,8,Lockdown,1,Lone Wolf Attacks,1,Lugansk,2,Macedonia,1,Machine Learning,7,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,10,Maldives,8,Mali,6,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,14,Marijuana,1,Marine Engineering,3,Maritime,39,Market Research,2,Marketing,38,Mars,2,Martech,9,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,MDGs,1,Mechatronics,2,Media War,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,15,Meta,1,Metadata,2,Metals,1,Mexico,8,Micro-finance,4,Microsoft,11,Migration,19,Mike Pence,1,Military,99,Military Exercise,9,Military-Industrial Complex,1,Mining,15,Missile Launching Facilities,5,Missile Systems,51,Mobile Apps,3,Mobile Communications,10,Mobility,4,Modi,7,Moldova,1,Monaco,1,Monetary Policy,5,Money Market,2,Mongolia,8,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,1,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Myanmar,25,NAFTA,3,NAM,2,Nanotechnology,4,NASA,13,National Security,5,Nationalism,2,NATO,30,Natural Disasters,10,Natural Gas,29,Naval Base,5,Naval Engineering,19,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,44,Navigation,2,Navy,21,NBC Warfare,2,NDC,1,Negotiations,2,Nepal,12,Neurosciences,6,New Delhi,4,New Normal,1,New York,4,New Zealand,5,News,1041,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nirbhaya,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,21,North America,40,North Korea,48,Norway,2,NSA,1,NSG,2,Nuclear,38,Nuclear Agreement,30,Nuclear Doctrine,1,Nuclear Security,44,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,4,OFID,5,Oil & Gas,340,Oil Gas,5,Oil Price,53,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,117,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,Operation Unified Protector,1,Operational Research,4,Opinion,610,Pacific,5,Pakistan,159,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,21,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,1,Paracels,1,Partition,1,Partnership,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,5,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,13,Philippines,11,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLAN,3,Plastic Industry,2,Poland,7,Polar,1,Policing,1,Policy,7,Policy Brief,6,Political Studies,1,Politics,36,Polynesia,3,Population,3,Portugal,1,Poverty,5,Power Transmission,6,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,17,Private Equity,1,Private Military Contractors,1,Programming,1,Project Management,4,Propaganda,4,Protests,11,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publishing,6,Putin,4,Q&A,1,Qatar,100,QC/QA,1,Qods Force,1,Quantum Computing,3,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,1,Rahul Guhathakurta,4,Railway,7,Raj,1,Ranking,4,Rape,1,RCEP,2,Real Estate,1,Recall,4,Recession,1,Red Sea,2,Referendum,5,Reforms,17,Refugee,23,Regional,4,Regulations,1,Rehabilitation,1,Religion & Spirituality,9,Renewable,13,Reports,37,Repository,1,Republicans,2,Rescue Operation,1,Research,4,Research and Development,20,Retail,36,Revenue Management,1,Risk Management,4,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,267,Russian Navy,4,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,3,SAR,1,SAT,1,Satellite,12,Saudi Arabia,122,Scandinavia,6,Science & Technology,335,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,1,Securities,1,Security,6,Semiconductor,3,Senate,4,Senegal,1,SEO,3,Serbia,4,Seychelles,1,SEZ,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,5,Shutdown,1,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,4,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,13,Situational Awareness,16,Smart Cities,7,Social Media Intelligence,40,Social Policy,39,Social Science,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,11,Somalia,5,South Africa,18,South America,45,South Asia,404,South China Sea,31,South East Asia,61,South Korea,42,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,7,Space,40,Space Station,2,Spain,8,Special Forces,1,Sports,2,Sports Diplomacy,1,Spratlys,1,Sri Lanka,21,Stamps,1,Startups,43,State of the Union,1,STEM,1,Stephen Harper,1,Stock Markets,16,Storm,2,Strategy Games,5,Sub-Sahara,3,Submarine,13,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,37,Surveillance,8,Survey,5,Sustainable Development,15,Swami Vivekananda,1,Sweden,3,Switzerland,3,Syria,111,Taiwan,19,Tajikistan,11,Taliban,17,Tamar Gas Fields,1,Tanzania,4,Tariff,4,Taxation,23,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,22,Telematics,1,Territorial Disputes,1,Terrorism,74,Testing,2,Texas,3,Thailand,7,The Middle East,602,Think Tank,287,Tibet,2,TikTok,1,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,2,TPP,2,Trade Agreements,13,Trade War,9,Trademarks,1,Trainging and Development,1,Transcaucasus,16,Transcript,4,Transpacific,2,Transportation,39,Travel and Tourism,5,Tsar,1,Tunisia,7,Turkey,73,Turkmenistan,9,U.S. Air Force,3,U.S. Dollar,2,UAE,131,UAV,21,UCAV,1,Udwains,1,Uganda,1,Ukraine,93,Ukraine War,6,Ummah,1,UNCLOS,6,Unemployment,1,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,69,United Nations,27,United States,644,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,8,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,15,US Postal Service,1,US Space Force,2,USA,16,USAF,18,UUV,1,Uyghur,3,Uzbekistan,12,Valuation,1,Vatican,1,Vedant,1,Venezuela,18,Venture Capital,3,Victim,1,Videogames,1,Vietnam,18,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,16,Water Politics,6,Weapons,10,Wearable,2,Weather,2,Webinar,1,WEF,2,Welfare,1,West,2,West Africa,18,West Bengal,2,Western Sahara,2,Whitepaper,2,WHO,3,Wikileaks,1,Wikipedia,1,Wildfire,1,Wildlife,2,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,10,Workshop,1,World Bank,27,World Economy,24,World Peace,10,World War I,1,World War II,3,WTO,6,Xi Jinping,8,Xinjiang,1,Yemen,26,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: IT | The Botnet Army Attacks, Explained
IT | The Botnet Army Attacks, Explained
This article covers sophisticated botnet attacks, whereby the attacked computer system becomes an attacker itself. Systems administrators and senior technology management staff that are aware of the modus operandi of botnets are best qualified to prevent their entry into a secured network. The article also discusses how FOSS systems ought to be protected from such attacks.
https://3.bp.blogspot.com/-34DwcKqYhfw/VrjFg-88x1I/AAAAAAAAIek/9-TDAtrkX20/s640/Feb%2B20161-003.jpg
https://3.bp.blogspot.com/-34DwcKqYhfw/VrjFg-88x1I/AAAAAAAAIek/9-TDAtrkX20/s72-c/Feb%2B20161-003.jpg
IndraStra Global
https://www.indrastra.com/2016/02/IT-Botnet-Army-Attacks-Explained-002-02-2016-0024.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2016/02/IT-Botnet-Army-Attacks-Explained-002-02-2016-0024.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content