Section 6.52 Zombies and Botnets Flashcards
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
Botnet
Network of compromised computers or devices controlled remotely by malicious actors who can control your processing, memory, storage and networking.
Zombie
The name of a compromised computer or device that is part of a botnet.
Used to perform tasks using remote commands from the attacker without the user’s knowledge.
Your workstation will be considered a zombie if infected and added to a larger network. The system will be controlled by a C2 node.
Botnets are made up of compromised system known as Zombies
Command and Control Node
Computer responsible for managing and coordinating the activities of other nodes or devices within a network
4 examples of what Botnets are used for
Common Botnet uses
Pivot Points
Disguise the real attacker
To Host illegal activities
To spam others by sending out phising campaings and other malware
Most Common Botnet uses
DDoS attack - Occurs when many machines target a single victim and attack them at the exact same time
Botnets are used by attackers to combine processing power to break through different types of encryption schemes
Attackers usually only use about 20-25% of any zombie’s power to avoid detection