Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Zombies"

From NetSec
Jump to: navigation, search
Line 1: Line 1:
 
{{cleanup}}
 
{{cleanup}}
 
{{expand}}
 
{{expand}}
A zombie computer, often shortened to zombie, is a computer connected to the internet that has been compromised/infected by a hacker, computer worm, trojan, or any other malware. More often then not a compromised computer is only one in many computers that are grouped together in a botnet, and will be remotely given commands to preform malicious tasks. Most users of these zombie computers are unaware that their system is compromised and may be linked to illegal activities over the internet. Because of this, these computers are metaphorically compared to brain dead zombies.
+
== Definition ==
 +
 
 +
A zombie computer, often referred to as a zombie, is a computer that is connected to the Internet and has been compromised by a hacker, worm, trojan, or some other form of malware. Zombies are typically only one of many other infected computers in the zombie "horde," also known as a "botnet." These infected computers execute commands that are issued remotely from a botnet command & control server to perform malicious tasks. Most of the time, users of these zombie computers are unaware that their system is compromised and may be linked to illegal activities, hence the metaphor of a brain-dead zombie.
 +
 
 +
== Exploitation ==
 +
 
 +
Computers are compromised by bot herders via various methods, such as, drive-by browser exploits or tricking the user into running a malformed program. However, like anything in the hacker world, there is no general rule for how one is infected. Botnets are typically controlled via IRC, however, they have also been controlled via Instant Message and Twitter. The most common place for these infected programs is in the "warez" scene.
 +
 
 +
== Types of Attacks ==
 +
 
 +
There are many ways a malicious hacker can benefit from a botnet. Botnets are commonly used to send spam e-mail, commit pay-per-click fraud, and launch distributed [http://www.blackhatacademy.org/security101/DDoS_Attacks denial-of-service attacks].

Revision as of 14:06, 12 March 2012

This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.

Definition

A zombie computer, often referred to as a zombie, is a computer that is connected to the Internet and has been compromised by a hacker, worm, trojan, or some other form of malware. Zombies are typically only one of many other infected computers in the zombie "horde," also known as a "botnet." These infected computers execute commands that are issued remotely from a botnet command & control server to perform malicious tasks. Most of the time, users of these zombie computers are unaware that their system is compromised and may be linked to illegal activities, hence the metaphor of a brain-dead zombie.

Exploitation

Computers are compromised by bot herders via various methods, such as, drive-by browser exploits or tricking the user into running a malformed program. However, like anything in the hacker world, there is no general rule for how one is infected. Botnets are typically controlled via IRC, however, they have also been controlled via Instant Message and Twitter. The most common place for these infected programs is in the "warez" scene.

Types of Attacks

There are many ways a malicious hacker can benefit from a botnet. Botnets are commonly used to send spam e-mail, commit pay-per-click fraud, and launch distributed denial-of-service attacks.