From the course: CompTIA CySA+ (CS0-002) Cert Prep: 1 Threat Management

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Understanding botnets

Understanding botnets

From the course: CompTIA CySA+ (CS0-002) Cert Prep: 1 Threat Management

Start my 1-month free trial

Understanding botnets

- [Instructor] You've already learned several ways that hackers can take control of a single computer through the use of malware. In some cases, such as worms, those infections can spread automatically from one system to another. One of the most common reasons that hackers take control of systems is to steal their computing power, storage, or network connectivity. They do this by joining infected systems to botnets. In effect, botnets are collections of zombie computers used for malicious purposes. They are a network of infected systems. A hacker creating a botnet begins by infecting a system with malware delivered through any of the techniques we've already discussed. Once the hacker gains control of the system, he or she joins it to the botnet. The system then lies dormant, awaiting further instructions from the hacker. How might a hacker use a botnet? First, the hacker doesn't usually use the botnet him or herself.…

Contents