answersLogoWhite

0

It is a 3 staged approach:

Stage 1 - Infect computers with programs such as Trojans that will allow remote access to take over control or initiate a program to perform a specific task(s). This will convert the computer to become a botnet.

Stage 2 - Collect botnets - so that the bot master will be able to make all the botnets to perform a specific task simultaneously.

Stage 3 - Perform DDoS (Distributed Denial of Service) attack! The bot master will activate his/her botnets to perform the denial of service (DOS) attack.

User Avatar

Wiki User

15y ago

Still curious? Ask our experts.

Chat with our AI personalities

FranFran
I've made my fair share of mistakes, and if I can help you avoid a few, I'd sure like to try.
Chat with Fran
TaigaTaiga
Every great hero faces trials, and you—yes, YOU—are no exception!
Chat with Taiga
SteveSteve
Knowledge is a journey, you know? We'll get there.
Chat with Steve

Add your answer:

Earn +20 pts
Q: How is a denial of service attack mounted and carried out?
Write your answer...
Submit
Still have questions?
magnify glass
imp