The document outlines the life cycle of a computer becoming infected and joining a botnet. It begins with an individual computer being exploited and turned into a bot. The new bot then communicates with the botnet operator to check in. The bot then retrieves modules to secure itself, listen for commands from the command and control server, execute any received commands, and erase its traces if commanded before abandoning the infected computer.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
96 views1 page
Botnet Life Cycle 1
The document outlines the life cycle of a computer becoming infected and joining a botnet. It begins with an individual computer being exploited and turned into a bot. The new bot then communicates with the botnet operator to check in. The bot then retrieves modules to secure itself, listen for commands from the command and control server, execute any received commands, and erase its traces if commanded before abandoning the infected computer.