1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
3 years ago
11

Discuss any three Networked Applications targeted/attacked by Botnet

Computers and Technology
2 answers:
siniylev [52]3 years ago
7 0

Answer:

The three applications attacked by Botnet can be attacks drive-by downloads, e-mail or exploiting some vulnerability in browsers such as Google Chrome or Internet Explorer.

Explanation:

Botnet is the name by which any group of infected computers is called and which are controlled by a remote attacker. A hacker or a group of them makes a botnet using malware that infects a large number of computers. Computers that are part of the botnet are known as "bots."

Hackers use two methods to infect computers and make them part of their botnet: one is drive-by downloads and email attacks. In the first, the process needs the attacker to find a web page with a vulnerability. In this way, the hacker loads the malicious code on the page and exploits such vulnerability as Google Chrome or Internet Explorer. The malicious code redirects the user's browser to a site controlled by the hacker, from where the bot code is downloaded and installed on the computer. Another type of attack is the sending of a large amount of spam, where a Word or PDF file with a malicious code or a link to a page where the code is hosted is attached.

storchak [24]3 years ago
5 0

Answer:

 Botnet is define as the number of the internet connection where each devices in the botnet connection run one and more than one bot in the network. It is basically use to performed DDOS ( Distributed denial of service) attack in the system, steal data and also allow the hacker to access different devices.

 The three networked applications that are targeted by the botnet is that:

  • Many e-mail applications are basically spammed by the users for entering the login credential by using the fake websites.
  • DDOS ( Distributed denial of service) attack is also one of the main application that are attacked by the botnet in the system.
  • Many types of banking applications that theft the data or important information which include users login details and credit or debit cards details that are hacked by the attackers in the system.  

You might be interested in
If you want to change the color of cell which button you click
Elodia [21]

Explanation:

Click alt + H then under the colours pick the colour you want to use a custom colour click more colours and then in the colours dialog box select the colour you want see if that works

7 0
4 years ago
To reload a picture taken with a digital camera means to copy the digital picture from the camera to your computer.
goldenfox [79]
The answer would be false.
7 0
3 years ago
Read 2 more answers
Servers that manage only one type of resource are called ____ servers.
Nataly [62]

Answer: Motherboard i tuink

Explanation:

3 0
3 years ago
What is the “framing” guideline for photography? What are some ways of framing within a photograph?
Anika [276]
 Framing in photography is one way of covering the other parts of the subject. Framing gives the photo some context, depth and layers and make the image as the main focal point.
4 0
3 years ago
Users are unable to open files that are not relevant to their jobs. Users can open and view files but are unable to edit them. U
Paul [167]
They describe the adven
8 0
3 years ago
Other questions:
  • Your grandmother tells you a dollar doesn’t go as far as it used to. She says the “purchasing power” of a dollar is much less th
    13·1 answer
  • A derived character that is shared by all members of a clade is called a ______________ of that clade.
    6·1 answer
  • Design and implement an application that reads an integer value representing a year from the user. The purpose of the program is
    6·1 answer
  • To comply with ATC instructions for altitude changes of more than 1,000 feet, what rate of climb or descent should be used?
    5·1 answer
  • Virtual classrooms are examples of communication or not​
    5·2 answers
  • an early type of GUI is created, which includes windows, pop-ups, icons, and menus. What year did this happen? Please help!!! qu
    12·1 answer
  • How can you have a safe browsing experience?
    10·2 answers
  • PLS FAST DONT EXPLAIN
    13·1 answer
  • PLEASE ANSWER IN COMPLETE SENTENCES - JOURNALISM, 30 POINTS
    11·2 answers
  • Your primary responsibility as a systems analyst concerns:_____.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!