Command and control (malware): Difference between revisions

Content deleted Content added
Iklln6 (talk | contribs)
Iklln6 (talk | contribs)
Line 36:
===Domains as C&C===
This is one of the earliest types of C&C known.
A [[zombie (computer science)|zombie]] computer accessaccesses a certainspecially-designed webpage or ___domain(s) in which commandsserve arethe listedlist forof itcontrolling to be controlledcommands.
The advantages of using a webpages or domains as C&C areis mostthat ofa thelarge timebotnet simplercan codingbe andeffectively easycontrolled toand updatemaintained andwith maintainvery asimple largecode botnetthat can withoutbe muchreadily issuesupdated.
 
The disadvantages of using webpages or domains is high bandwidth needed if a large botnet is built, also many domains have been seized by government agencies in order to take down a botnets without much trouble or effort. The domains can be also a target for [[denial-of-service attack]]s which may take a ___domain based botnet offline.
Disadvantages of using this method are that it uses a considerable amount of bandwidth at large scale, and domains can been quickly seized by government agencies without much trouble or effort. If the domains controlling the botnets are not seized, they are also easy targets to compromise with [[denial-of-service attack]]s.
 
===IRC as C&C===