 What is a botnet?
 How do they work?
 Solution
1
 A botnet is a collection of infected computers
that are remotely controlled by a hacker
 Once a computer is infected with malicious
software (bot), the hacker can control the
computer remotely over the Internet. From
then on, the computer is a zombie, doing the
bidding of the hacker, although the user is
completely unaware. Collectively, such
computers are called a botnet
2
1. hacker infected victims with bot
hacker victim
C&C server
3
2.bot connects to the C&C
server using HTTP,IRC or
other protocol
victim
C&C server
Hacker
4
3.Botmaster sends
commands
through C&C server to
zombie
hacker victim
C&C server
5
4.Repeat these process and
Hacker have bot army to
Control from a single point
hacker
Victims, zombies
C&C server
6
 Keep up-to-date with security patches Hackers
frequently exploit vulnerabilities in operating systems and
programs
 Use firewalls A network firewall is installed at your
organization’s boundary and admits only authorized types
of traffic
 Don’t follow links in unexpected emails Links in
unexpected emails can take you to bogus websites
7

More Related Content

PPTX
Botnets 101
PPTX
Botnet Architecture
PPTX
PPTX
PPTX
Botnets
PPT
Botnet
PDF
BOTNET
PPT
BotNet Attacks
Botnets 101
Botnet Architecture
Botnets
Botnet
BOTNET
BotNet Attacks

What's hot (20)

PPT
Botnets
PPT
Botnet Detection Techniques
PPTX
introduction to Botnet
PDF
A review botnet detection and suppression in clouds
PDF
A Brief Incursion into Botnet Detection
PPTX
Study on Botnet Architecture
PDF
A Survey of Botnet Detection Techniques
PDF
about botnets
PPTX
Botnet Detection in Online-social Network
PPTX
Botnets In Cyber Security
PPTX
Botnet
PDF
What is botnet?
PPTX
Types of malware threats
PDF
Global Botnet Detector
PDF
Ccna 1 8
PPTX
PPTX
Social engineering
PDF
A Dynamic Botnet Detection Model based on Behavior Analysis
PPTX
Bots and Botnet
PPTX
Ethical Hacking4
Botnets
Botnet Detection Techniques
introduction to Botnet
A review botnet detection and suppression in clouds
A Brief Incursion into Botnet Detection
Study on Botnet Architecture
A Survey of Botnet Detection Techniques
about botnets
Botnet Detection in Online-social Network
Botnets In Cyber Security
Botnet
What is botnet?
Types of malware threats
Global Botnet Detector
Ccna 1 8
Social engineering
A Dynamic Botnet Detection Model based on Behavior Analysis
Bots and Botnet
Ethical Hacking4
Ad

Similar to Botnets presentation (20)

PPTX
Mcs2453 aniq mc101053-assignment1
PDF
Botnet Attacks How They Work and How to Defend Against Them.pdf
PPTX
unit cyber security BOTNETS Documents.pptx
PPT
Part One - What is a Botnet?
PPT
Powerpoint v3
PDF
Untitled document.pdf
PDF
BOTNETS
PPTX
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
PPT
PPTX
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
PPT
botnet.ppt
PPTX
BOTLAB excersise
PDF
Botnetsand applications
PPTX
Botnet.pptx
PPT
Honeypot Project
PDF
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
PPTX
PPT
Defending Against Botnets
PPTX
Botnets' networks
PDF
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Mcs2453 aniq mc101053-assignment1
Botnet Attacks How They Work and How to Defend Against Them.pdf
unit cyber security BOTNETS Documents.pptx
Part One - What is a Botnet?
Powerpoint v3
Untitled document.pdf
BOTNETS
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
botnet.ppt
BOTLAB excersise
Botnetsand applications
Botnet.pptx
Honeypot Project
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Defending Against Botnets
Botnets' networks
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Ad

Recently uploaded (20)

PDF
Pitch Perfect Minimal Presentation for PPT
PDF
Public speaking for kids in India - LearnifyU
PDF
IKS PPT.....................................
PPTX
Lesson 1 (Digital Media) - Multimedia.pptx
PPTX
Pharmaceutical industry and drugdevelopment.pptx
PPTX
Introduction to DATIS a foundation stone for ISSP in Greece
PDF
Books and book chapters(CITATIONS AND REFERENCING) (LORENA).pdf
PDF
Pitch Style Data Report Template Preview
PPT
Lessons from Presentation Zen_ how to craft your story visually
PDF
Financial Managememt CA1 for Makaut Student
PPTX
Bob Difficult Questions 08 17 2025.pptx
DOCX
CLASS XII bbbbbnjhcvfyfhfyfyhPROJECT.docx
PPTX
CASEWORK Pointers presentation Field instruction I
PPTX
Literatura en Star Wars (Legends y Canon)
PPTX
HOW TO HANDLE THE STAGE FOR ACADEMIA AND OTHERS.pptx
PPTX
Ulangan Harian_TEOREMA PYTHAGORAS_8.pptx
PDF
Unnecessary information is required for the
PPTX
Kompem Part Untuk MK Komunikasi Pembangunan 5.pptx
PDF
soft skills for kids in India - LearnifyU
Pitch Perfect Minimal Presentation for PPT
Public speaking for kids in India - LearnifyU
IKS PPT.....................................
Lesson 1 (Digital Media) - Multimedia.pptx
Pharmaceutical industry and drugdevelopment.pptx
Introduction to DATIS a foundation stone for ISSP in Greece
Books and book chapters(CITATIONS AND REFERENCING) (LORENA).pdf
Pitch Style Data Report Template Preview
Lessons from Presentation Zen_ how to craft your story visually
Financial Managememt CA1 for Makaut Student
Bob Difficult Questions 08 17 2025.pptx
CLASS XII bbbbbnjhcvfyfhfyfyhPROJECT.docx
CASEWORK Pointers presentation Field instruction I
Literatura en Star Wars (Legends y Canon)
HOW TO HANDLE THE STAGE FOR ACADEMIA AND OTHERS.pptx
Ulangan Harian_TEOREMA PYTHAGORAS_8.pptx
Unnecessary information is required for the
Kompem Part Untuk MK Komunikasi Pembangunan 5.pptx
soft skills for kids in India - LearnifyU

Botnets presentation

  • 1.  What is a botnet?  How do they work?  Solution 1
  • 2.  A botnet is a collection of infected computers that are remotely controlled by a hacker  Once a computer is infected with malicious software (bot), the hacker can control the computer remotely over the Internet. From then on, the computer is a zombie, doing the bidding of the hacker, although the user is completely unaware. Collectively, such computers are called a botnet 2
  • 3. 1. hacker infected victims with bot hacker victim C&C server 3
  • 4. 2.bot connects to the C&C server using HTTP,IRC or other protocol victim C&C server Hacker 4
  • 5. 3.Botmaster sends commands through C&C server to zombie hacker victim C&C server 5
  • 6. 4.Repeat these process and Hacker have bot army to Control from a single point hacker Victims, zombies C&C server 6
  • 7.  Keep up-to-date with security patches Hackers frequently exploit vulnerabilities in operating systems and programs  Use firewalls A network firewall is installed at your organization’s boundary and admits only authorized types of traffic  Don’t follow links in unexpected emails Links in unexpected emails can take you to bogus websites 7