SlideShare a Scribd company logo
BOTNET
BOTNET
A botnet is a number of Internet-connected devices, each of
which is running one or more bots
BOTNET
Botnets can be used to perform distributed denial-of-service
attack (DDoS attack), steal data,[1] send spam, and allow the
attacker access to the device and its connection

More Related Content

More from MohsinHusenManasiya

Qr codes
Qr codesQr codes
Teamviewr
TeamviewrTeamviewr
Malware
MalwareMalware
Q 1
Q 1Q 1
Ppi
PpiPpi
Nfc
NfcNfc
Network
NetworkNetwork
Mobile processor
Mobile processorMobile processor
Mobile processor
MohsinHusenManasiya
 
Lasik eye surgery
Lasik eye surgeryLasik eye surgery
Lasik eye surgery
MohsinHusenManasiya
 
Iris
IrisIris
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
MohsinHusenManasiya
 
Ingestible robots
Ingestible robotsIngestible robots
Ingestible robots
MohsinHusenManasiya
 
I3 vs i5 vs i7
I3 vs i5 vs i7I3 vs i5 vs i7
I3 vs i5 vs i7
MohsinHusenManasiya
 
How does wireless inductive charging work
How does wireless inductive charging workHow does wireless inductive charging work
How does wireless inductive charging work
MohsinHusenManasiya
 
History of computer
History of computerHistory of computer
History of computer
MohsinHusenManasiya
 
Gps
GpsGps
Google daydream vr
Google daydream vrGoogle daydream vr
Google daydream vr
MohsinHusenManasiya
 
Google assistant
Google assistantGoogle assistant
Google assistant
MohsinHusenManasiya
 
Explainning batteries
Explainning batteriesExplainning batteries
Explainning batteries
MohsinHusenManasiya
 
Explainning 32 bit 64 bit processer
Explainning 32 bit 64 bit processerExplainning 32 bit 64 bit processer
Explainning 32 bit 64 bit processer
MohsinHusenManasiya
 

More from MohsinHusenManasiya (20)

Qr codes
Qr codesQr codes
Qr codes
 
Teamviewr
TeamviewrTeamviewr
Teamviewr
 
Malware
MalwareMalware
Malware
 
Q 1
Q 1Q 1
Q 1
 
Ppi
PpiPpi
Ppi
 
Nfc
NfcNfc
Nfc
 
Network
NetworkNetwork
Network
 
Mobile processor
Mobile processorMobile processor
Mobile processor
 
Lasik eye surgery
Lasik eye surgeryLasik eye surgery
Lasik eye surgery
 
Iris
IrisIris
Iris
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
Ingestible robots
Ingestible robotsIngestible robots
Ingestible robots
 
I3 vs i5 vs i7
I3 vs i5 vs i7I3 vs i5 vs i7
I3 vs i5 vs i7
 
How does wireless inductive charging work
How does wireless inductive charging workHow does wireless inductive charging work
How does wireless inductive charging work
 
History of computer
History of computerHistory of computer
History of computer
 
Gps
GpsGps
Gps
 
Google daydream vr
Google daydream vrGoogle daydream vr
Google daydream vr
 
Google assistant
Google assistantGoogle assistant
Google assistant
 
Explainning batteries
Explainning batteriesExplainning batteries
Explainning batteries
 
Explainning 32 bit 64 bit processer
Explainning 32 bit 64 bit processerExplainning 32 bit 64 bit processer
Explainning 32 bit 64 bit processer
 

Recently uploaded

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 

Recently uploaded (11)

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 

Botnet

  • 2. BOTNET A botnet is a number of Internet-connected devices, each of which is running one or more bots
  • 3.
  • 4. BOTNET Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data,[1] send spam, and allow the attacker access to the device and its connection