Anatomy of a botnet
How Bots and Botnets work
Detailed explaination on how bots spread and how they are controlled by their masters.
Types of Bots
Here we present some of the more widespread and well-known bots.
Types of Attacks
A botnet is nothing more than a tool, there are as many different motives for using.
In computer security, a vulnerability is defined as: a weakness that allows an attacker to reduce a system's information assurance.
While botnets are often named after the malware that created them, multiple botnets typically use the same malware, but are operated by different entities.
History of botnets
Real time tracker
Online tool to track active botnets.
Historical list of botnets
List of the main botnets created along the history.
Good Uses for Botnets
There are plenty of good examples of uses for botnets, besides the malicious ones.
Botnet detection deals with the identification of bots in the machine or network so that some sort of remedy can be done.
Main countermeasures against botnets.
Botnet Lab Architecture
Architecture and structure of the botnet laboratory.
Setup Botnet Lab
Setup guide for botnet laboratory.
Build and Distribute
Adding the bot to startup and generation executables.