1 00:00:14,140 --> 00:00:20,500 In the last lecture, we saw different types of denial of service or distributed denial of service attacks 2 00:00:20,980 --> 00:00:21,850 in this lecture. 3 00:00:22,140 --> 00:00:24,070 We will see what is a botnet? 4 00:00:24,940 --> 00:00:30,640 A botnet refers to a group of computers which have been infected by malware and have come under the 5 00:00:30,640 --> 00:00:32,890 control of a malicious actor or hacker. 6 00:00:33,550 --> 00:00:39,820 The term botnet is a portmanteau from the words robot network, and each infected device is called the 7 00:00:39,820 --> 00:00:40,180 bot. 8 00:00:40,510 --> 00:00:46,600 Mortensen's can be designed to accomplish illegal or malicious tasks, including sending spam, stealing 9 00:00:46,600 --> 00:00:52,870 data, ransomware, fraudulently clicking on ads are distributed in a service that its leaders attacks. 10 00:00:52,870 --> 00:00:58,020 While some malware, such as ransomware, will have a direct impact on the owner of the device, the 11 00:00:58,300 --> 00:01:01,030 botnet malware can have different levels of visibility. 12 00:01:01,810 --> 00:01:08,080 Some malware is designed to take control of the device, while other malware then silently as a background 13 00:01:08,080 --> 00:01:15,820 process while waiting silently for the instructions from the attacker or bot handler, self-propagating 14 00:01:15,820 --> 00:01:19,660 botnet recruit additional bots through a variety of different channels. 15 00:01:20,320 --> 00:01:26,080 Pathways for infection include the exploitation of website vulnerabilities, Trojan horse malware and 16 00:01:26,080 --> 00:01:31,630 cracking big authentication to gain remote access once access has been obtained. 17 00:01:31,870 --> 00:01:36,400 All of these methods for infection result in the installation of the malware on the target device, 18 00:01:36,730 --> 00:01:40,050 allowing remote control by the operator of the botnet. 19 00:01:40,810 --> 00:01:46,900 Once the device is infected, it may attempt to self-propagating the malware by recruiting other hardware 20 00:01:46,900 --> 00:01:48,580 devices in the surrounding network. 21 00:01:49,690 --> 00:01:55,510 While it's invisible to pinpoint the exact numbers of the bots in a particular botnet, estimations 22 00:01:55,510 --> 00:02:01,420 for total number of partners in a sophisticated botnet have ranged in size from a few thousand to greater 23 00:02:01,420 --> 00:02:02,140 than a million. 24 00:02:02,590 --> 00:02:09,550 While Bawdiness created reasons for using a botnet ranges from activism to state sponsored disruption, 25 00:02:10,090 --> 00:02:15,970 with many attacks being carried, simply for profit or characteristics of a botnet is the ability to 26 00:02:15,970 --> 00:02:18,610 receive updated instructions from the bot handler. 27 00:02:19,420 --> 00:02:25,120 The ability to communicate with each board in the network allows the attacker to alternate attack vectors, 28 00:02:25,330 --> 00:02:30,190 genes, a targeted IP address, terminate an attack and other customized actions. 29 00:02:31,030 --> 00:02:32,470 Botnet DNS Mavity. 30 00:02:32,920 --> 00:02:38,590 But the control structures can be broken down into Pugin categories, the client server botnet model 31 00:02:39,130 --> 00:02:40,420 and the peer to peer. 32 00:02:40,420 --> 00:02:43,720 But this is all for this lecture. 33 00:02:44,260 --> 00:02:50,560 In next lecture, we will see how to create a spectacle on a system or a targeted website.