From the course: CompTIA Security+ (SY0-601) Cert Prep: 1 Threats, Attacks, and Vulnerabilities

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Understanding botnets

Understanding botnets

- [Narrator] You've already learned several ways that hackers can take control of a single computer through the use of malware. In some cases, such as worms, those infections can spread automatically from one system to another. One of the most common reasons that hackers take control of systems is to steal their computing power, storage, or network connectivity. They do this by joining infected systems to botnets. Botnets are collections of zombie computers used for malicious purposes. They are a network of infected systems. A hacker creating a botnet begins by infecting a system with malware deliver it through any of the techniques that we've already discussed. Once the hacker gains control of the system, he or she joins it to the botnet. The system then lies dormant, awaiting further instructions from the botnet operator. So, how might a hacker use a botnet? Well, first hackers who create botnets don't generally use…

Contents