begood Posted March 7, 2010 Report Posted March 7, 2010 Traditionally botnet's have recked more havoc then good. By effectively controlling millions of unsuspecting user PC's, modern botnets have demonstrated the ability to manage a global infrastructure on an unimaginable scale. By applying the same techniques and approaches used in botnets within your computing environment you'll be capable of handling any demands placed on you or your infrastructure.This how-to article will take a closer look at using common open source components to create your very own botnet for the purposes for securing, protecting, load testing and managing your global internet infrastructure. Contents * 1 Key Components include * 2 Introduction to Botnets o 2.1 Good Vs Evil o 2.2 Darknet Vs Botnet o 2.3 Business Usages + 2.3.1 Cloud Computing + 2.3.2 Grid Computing / Computational + 2.3.3 Application / Website Scaling + 2.3.4 Load Testing + 2.3.5 Fault Tolerance * 3 How To Build a Botnet o 3.1 Difficulty Level o 3.2 What You'll Need o 3.3 1. Allocate computers / Servers o 3.4 2. Choose Operating Environment (Server Virtualization) + 3.4.1 Just enough operating system (JEOS) + 3.4.2 Server Virtualization + 3.4.3 What is Virtualization? + 3.4.4 Blue Pill Server Virtualization + 3.4.5 Enomalism Elastic Computing Platform o 3.5 3. Configure Networking + 3.5.1 OpenVPN Technical Overview o 3.6 4. Configure Command & Control + 3.6.1 eXtensible Messaging and Presence Protocol o 3.7 5. Define User Access o 3.8 6. Applications & Monitoring o 3.9 7. Auto discovery * 4 Related Reading * 5 Warnings o 5.1 With great Power comes great responsibilityBuild your own botnet with open source software - Wired How-To Wiki Quote