WHAT IS BOTNET?
Introduction to the BotNet Method in the hacker world
At this era of information technology make everyone to use technology in life. Technology such as internet make our life easier. In order using tinformation technology we need to know some hacking techniques to avoid attack from bad hacker which is make us in trouble, such as missoperation, lost data, hijacking, exploiting and many other. One of the many hacking techniques that are hackers' favorite is technique BotNet, in terms of breadth of BotNet technique is also divided into several sections such as Zeus attacks, DoS attacks, malware and email spam.
According to some hacking experts, that BotNet is a collection of programs that are interconnected through an internet connection that communicates with similar programs to perform certain tasks. But basically this Botnet technique can be used to maintain the security of IRC channels, send spam emails, or participate in DDos attacks. The word botnet itself comes from two words, namely robot and network.
Botnet is also one of the activities to infiltrate certain programs to computer servers where the programs are usually infiltrated as Worms, Trojan horses, or Backdoors, under the command of Master Refer and controlled by a remote, so that the program can work at any time according to the wishes of the Master, whose aim is to disrupt or damage a network or computer operating system (crime) that has the potential to paralyze the internet network widely.
What are the losses generated by botnet ????
This botnet has the privilege, because it is not too detrimental to the computer that he infiltrated directly, but the loss of this botnet will be clearly felt to the next target or real target of the botnet master, okay than talking at length, better just go ahead, here is the resulting loss botnet:
A. For computers infected with botnets (zombie computers):
1. The computer will slightly decrease its performance, because it is used in the background by botnets
2. Your network connection or network connection will greatly decrease its performance
3. Your computer will waste bandwidth (this will be felt if you use a volume-based internet service or if your internet service has a quota
4. Your internet speed will slow down
B. For the Next target or person who is really the target of the bot master:
Bandwidth will also be wasteful, because it is used to download information provided by botnets (for example the case of E-mail Spam)
2. If you are deceived by the Spam E-mail, then the impact of the loss could extend to economic and social aspects
3. If an army of zombie computers (computers infected with Botnets) attack your system in one unit of time, it is not impossible that this could paralyze your system or make your system malfunction
4. It is not impossible if the zombie computer sends information to you, and you open that information, an army of malware turns out to infect your computer right away
5. It is not impossible if your computer will also become a zombie computer too
FOLLOWING THIS WORK STAGE FROM BotNet
1. Botnet operators spread viruses or worms that infect ordinary users' computers with intermediary bot applications.
2. Bots on infected PCs log in to certain C&C (command & control) servers
3. A spammer (trash) buys botnet services from an operator.
4. The spammers deliver spam messages to the operator. The operator instructed the infected machine to send spam messages through the control panel on the web server.
Botnets are exploited for various purposes, including DoS attacks, creation or misuse of SMTP mail relays for spam (see Spambot), click fraud, spamdext, and theft of application serial numbers, login credentials, and financial information such as credit card numbers.
The botnet control community has long struggled for the title of the most bot owners, the highest broadband, and the most "high-quality" infected machines, such as universities, companies and governments.

0 Comment:
Post a Comment