Software robots called “bots” are programs designed to perform an extensive range of automated tasks. For example, Internet search engines routinely use bots to gather Web-page information and computer games use bots as opponents for human players. Hackers now use bot programs to coordinate groups of personal computers infected by malicious software for spamming, denial-of-service attacks on Web sites, theft, and fraud. These hacker-controlled networks are called botnets (aka zombie army).
We call the Attacker's PC 'MASTER' and the victim's PC 'SLAVE' in this kind of scenario.
What can a botnet do?
• Allow the controller to download anything he specify
• Can steal your information, Credit Cards, Passwords etc..
• Can use your connection as a DDoS attack
• Can view your WAN/LAN information
• Can execute files whenever the controller wants
• Can view what you are viewing using a recorded or a screen shot function
We call the Attacker's PC 'MASTER' and the victim's PC 'SLAVE' in this kind of scenario.
What can a botnet do?
• Allow the controller to download anything he specify
• Can steal your information, Credit Cards, Passwords etc..
• Can use your connection as a DDoS attack
• Can view your WAN/LAN information
• Can execute files whenever the controller wants
• Can view what you are viewing using a recorded or a screen shot function