From Wikipedia, the free encyclopedia

Bot herders [1] are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program. [2] The infected machine then becomes one of many zombies [3] in a botnet and responds to commands given by the bot herder, usually via an Internet Relay Chat channel.

One of the new bot herders includes the controller of Conficker.

A bot herder usually uses a pseudonym to keep themselves anonymous and may use proxy servers, shell accounts, and bouncers to conceal their IP address thus maintaining anonymity.

See also

References

  1. ^ Goodin, Dan. "Microsoft goes bot herder hunting in streets of Russia". www.theregister.com.
  2. ^ "Bot herder | Malwarebytes Glossary". Malwarebytes.
  3. ^ "Bugtraq". bugtraq.securityfocus.com.
From Wikipedia, the free encyclopedia

Bot herders [1] are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program. [2] The infected machine then becomes one of many zombies [3] in a botnet and responds to commands given by the bot herder, usually via an Internet Relay Chat channel.

One of the new bot herders includes the controller of Conficker.

A bot herder usually uses a pseudonym to keep themselves anonymous and may use proxy servers, shell accounts, and bouncers to conceal their IP address thus maintaining anonymity.

See also

References

  1. ^ Goodin, Dan. "Microsoft goes bot herder hunting in streets of Russia". www.theregister.com.
  2. ^ "Bot herder | Malwarebytes Glossary". Malwarebytes.
  3. ^ "Bugtraq". bugtraq.securityfocus.com.

Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook