Section 6.52 Zombies and Botnets Flashcards

Objectives 2.4 Given a Scenario, analyse indicators of malicious activity

1
Q

Botnet

A

Network of compromised computers or devices controlled remotely by malicious actors who can control your processing, memory, storage and networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Zombie

A

The name of a compromised computer or device that is part of a botnet.

Used to perform tasks using remote commands from the attacker without the user’s knowledge.

Your workstation will be considered a zombie if infected and added to a larger network. The system will be controlled by a C2 node.

Botnets are made up of compromised system known as Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Command and Control Node

A

Computer responsible for managing and coordinating the activities of other nodes or devices within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 examples of what Botnets are used for

Common Botnet uses

A

Pivot Points

Disguise the real attacker

To Host illegal activities

To spam others by sending out phising campaings and other malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most Common Botnet uses

A

DDoS attack - Occurs when many machines target a single victim and attack them at the exact same time

Botnets are used by attackers to combine processing power to break through different types of encryption schemes

Attackers usually only use about 20-25% of any zombie’s power to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly