Spying With Bots

Thorsten Holz

USENIX ;login:, Volume 30, Issue 6, Pages 18-23, December 2005


During the past few years, we have seen a shift in how systems are being attacked. After a successful compromise, a bot (also referred to as a zombie or drone) is often installed on the system. This small program provides a remote control mechanism to command the victim. Via this remote control mechanism, the attacker is able to issue arbitrary commands and thus has complete control over the victim’s computer system.

[Link] [pdf]

Tags: Botnets, bots