This tutorial uses mIRC and other tools, which you will need to download. You can find them via google or through pirating methods listed in the Misc Hacks section of this app.
Q:What is a botnet? A: A botnet is where you send a trojan to someone and when they open it a bot joins your channel on IRC(secretly, they don't know this)Once done the computer is now refered to as a zombie. Depending on the source you used, the bot can do several things. Keylog their computer1, take picutes of their screen, turn on their webcam and take pics/movies, harvest cdkeys and game keys or even cracks, passwords, aim screen names, emails, you can also spam, flood, DDoS, ping, packet, yada yada, some have built in md5 crackers, and clone functions to spamm other irc channels and overrun a channel and even perform IRC Takeovers. Once again depending on the bot it may be able to kill other fellow competeter bots. Or even kill AV/FW apon startup. Add itself to registry. Open sites. Open commands. Cmd, notepad, html, Anything is possible !
Theres the infected computers bots the attacker, the server, and the slave.
Quote: while the term botnet can be used to refer to any group of bots, such as IRC bots, the word is generally used to refer to a collection of compromised machines running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure. A botnet's originator (aka bot herder) can control the group remotely, usually through a means such as IRC, and usually for nefarious purposes. Individual programs manifest as IRC bots. Often the command and control takes place via an IRC server or a specific channel on a public IRC network. A bot typically runs hidden, and complies with the RFC 1459 (IRC) standard. Generally, the perpetrator of the botnet has compromised a series of systems using various tools (exploits, buffer overflows, as well as others; see also RPC). Newer bots can automatically scan their environment and propagate themselves using vulnerabilities and weak passwords. Generally, the more vulnerabilities a bot can scan and propagate through, the more valuable it becomes to a botnet controller community.
Suspects in the case used the Randex worm to establish a 30,000 strong botnet used to carry out low profile DDoS attacks and steal the CD keys for games, he explained. They had a huge weapon and didn't use as much as they could have done, Santorelli told El Reg. The main damage caused in the case is down to the cost of cleaning up infected PCs.
Botnets are being used for Google Adword click fraud, according to security watchers.
Now enough with all the quotes. As you can see, you can do anything with a botnet. Anything is possible. This is my bot and tutorial. You can host your bots on irc on a public server but I would recommend a private, password protected server.
Download and install Microsoft Visual C++ 6.0 Standard Edition (63.4 mb)
Download and install the Service pack 6
Download and install Windows SDK
Open up Microsoft Visual C++ Compilier 6.0
Go to Tools > Options and Click the Directories tab
Now, browse to these directories and add them to the list: (Click the dotted box to add)
Browse to your Rxbot 7.6 folder and open the rBot.dsw file
Right Click rBot Files and click Build:
rBot.exe will be in the Rxbot 7.6 > Debug folder !!!
YOUR DONE !!!! Now get the rbot and pack it (Use tool in third post and open rbot and click Protect and send it to some idiots, Follow tutorial on top to learn how to spread. Some good ways are: Torrents, AIM, Friends, Myspace, School computers, and P2P but there are more ways. ENJOY !