This document discusses researching and developing botnets and zombie networks on computer systems. It plans to first find security vulnerabilities on local area network machines using VMware and then attempt to create, distribute, and control a botnet through the internet using DarkComet. DarkComet is described as a powerful remote administration tool that can remotely control victims' computers without consent by viewing files, webcam, and microphone activity as well as downloading and executing files. The document concludes by discussing expanding the research to bypass antivirus detection, study other common botnets, methods for botnet distribution and exploitation, and defenses against becoming zombie networks.