A network of compromised computers (bots/zombies) controlled remotely by an attacker, commonly used for DDoS attacks, spam campaigns, or cryptocurrency mining.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free