0% found this document useful (0 votes)
96 views1 page

Botnet Life Cycle 1

The document outlines the life cycle of a computer becoming infected and joining a botnet. It begins with an individual computer being exploited and turned into a bot. The new bot then communicates with the botnet operator to check in. The bot then retrieves modules to secure itself, listen for commands from the command and control server, execute any received commands, and erase its traces if commanded before abandoning the infected computer.

Uploaded by

wengie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views1 page

Botnet Life Cycle 1

The document outlines the life cycle of a computer becoming infected and joining a botnet. It begins with an individual computer being exploited and turned into a bot. The new bot then communicates with the botnet operator to check in. The bot then retrieves modules to secure itself, listen for commands from the command and control server, execute any received commands, and erase its traces if commanded before abandoning the infected computer.

Uploaded by

wengie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

`

COMPUTER IS EXPLOITED
ITS BECOMES A BOT

NEW BOTS RALLY TO LET


BOTHERDER KNOWS ITS
JOINED THE TEAM

RETRIEVE THE ANTIANTIVIRUS MODULE

SECURE THE NEW BOT


CLIENT

RETRIEVE THE PAYLOAD


MODULE

LISTEN TO THE C&C


SERVER/PEER FOR
COMMANDS

REPORT RESULTS TO THE


C&C CHANNEL

EXECUTE THE COMMANDS

ON COMMAND, ERASE ALL


EVIDENCE AND ABANDON THE
CLIENT

Fig 4: Life Cycle of A Botnet

You might also like