From the course: CompTIA Security+ (SY0-701) Cert Prep

Unlock the full course today

Join today to access over 24,000 courses taught by industry experts.

Understanding botnets

Understanding botnets

- [Instructor] You've already learned several ways that hackers can take control of a single computer through the use of malware. In some cases, such as worms, those infections can spread automatically from one system to another. One of the most common reasons that hackers take control of systems is to steal their computing power, storage, or network connectivity. They do this by joining infected systems to botnets. Botnets are collections of zombie computers used for malicious purposes. They're a network of infected systems. A hacker creating a botnet begins by infecting a system with malware delivered through any of the techniques that we've already discussed. Once the hacker gains control of the system, he or she joins it to the botnet. The system then lies dormant, awaiting further instructions from the botnet operator. So how might a hacker use a botnet? Well, first, hackers who create botnets don't generally use those botnets themselves. They often sell or rent the botnet to…

Contents