From the course: Cert Prep: ISC2 Certified in Cybersecurity (CC)

Unlock this course with a free trial

Join today to access over 23,700 courses taught by industry experts.

Botnets

Botnets

- [Instructor] You've already learned several ways that hackers can take control of a single computer through the use of malware. In some cases, such as worms, those infections can spread automatically from one system to another. One of the most common reasons that hackers take control of systems is to steal their computing power, storage, or network connectivity. They do this by joining infected systems to botnets. Botnets are collections of zombie computers used for malicious purposes. They are a network of infected systems. A hacker creating a botnet begins by infecting a system with malware delivered through any of the techniques that we've already discussed. Once the hacker gains control of the system, he or she joins it to the botnet. The system then lies dormant awaiting further instructions from the botnet operator. So how might a hacker use a botnet? Well, first hackers who create botnets don't generally use…

Contents