What is botnet? How botnet work exactly

What is Botnet? How Botnet works exactly!

Introduction

In this post, you will learn what is a botnet and how they work? And you will also learn the types of botnet attacks. I have already written a detailed post on what is a bot and how bot works, To read [Click here].

What is botnet?

Botnet stand for robot and network. The cybercriminals send infected bots to the user’s computers and make the user’s device involve in a mass cyberattack is called a botnet. In other words, millions of malware affected devices will be in a network of cyberattacks is a botnet.

The aim of the cybercriminals to do a bot net attack is to steal data. A bot can be PC, MAC or mobile.

Also Read: What is Adware? How Adware they work!

How Botnet works

Botnets are created to repeated tasks very often and a single cybercriminal can’t do cyberattack on the biggest companies like Google and Microsoft. So, they need an Army to attack such bigger companies and these cyber criminals create malware and inject in random user’s computer.

The cybercriminals spread this malware by two methods. Firstly, installing software that is malicious or visiting a Malware infected site.

Now you knew how cybercriminals spread the Malware. And these bots have a herder bot that controls all other bots. The herder bot receives commands from the cybercriminal.

Three components make the Bot network;

  • Bot Master or cyber criminal
  • Control
  • Bots

Take a look at the below image on how a Bot networks;

Botnet Example

From the above image, we could clearly understand we need a botmaster to control the herder bot. The herder bot collects and send data received from the botmaster. The herder bot is like a mediator. And now these infected devices are ready to perform a DDoS attack.

Also Read: I have already written a post on what is Malware and different types.

Types of Botnet

There are two types of bot net;

  1. centralize model
  2. decentralized model

Centralize model

Centralize model bot network

From the above image, I can say the infected devices are not interconnected. And the commands to the bots straightly coming from command and control servers (C&CServer). In a centralized model, there is a high chance of getting caught. Because the command comes from a single source.

Decentralized model

We can call this method a decentralized or P2P method. In this method, there is a herder bot, but it behaves like a zombie computer, which means it behaves like other infected bots.

Decentralize model or P2P (Peer-to-peer bot network.

The above image is an example of decentralizing the Botnet.

Also Read: What is CAPTCHA? Difference between CAPTCHA Vs reCAPTCHA

What information does a botnet carry?

  • The botnet first reads your system data, and it can rewrite the system data.
  • Continuous monitoring of users data.
  • Gathers infected device users personal data.
  • Check any other connected devices for vulnerability.

Major Botnet Attacks Method

  1. Phishing method – This method is very old but still it works. The botnets spread many malicious e-mails to unknown users. If a human does it, he needs to compile the malware in a file and attach it with email, and he has to send to each user. But the botnet reduce the time.
  2. DDoS – Botnet are formed to do this cyberattack DDoS (distributed denial of service). DDoS attack takes place by overloading a server and making them to crash and to this attack the cybercriminal need lots of users.
  3. Spamming – In this, method the criminal target users data. This method is target to website, forums, chat box etc.,

Also Read: What is CAPTCHA and how CAPTCHA work?

Also Read: How does a bar code work!

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions or brave browser to block ads. Please support us by disabling these ads blocker.Our website is made possible by displaying Ads hope you whitelist our site. We use very minimal Ads in our site

 

Scroll to Top