{"id":1237,"date":"2020-10-22T06:55:59","date_gmt":"2020-10-22T06:55:59","guid":{"rendered":"https:\/\/invezt.co\/kaymera\/?post_type=glossary&amp;p=1237"},"modified":"2020-10-22T06:55:59","modified_gmt":"2020-10-22T06:55:59","slug":"botnet","status":"publish","type":"glossary","link":"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/","title":{"rendered":"Botnet"},"content":{"rendered":"<p>Una botnet es un conjunto de ordenadores (denominados bots) controlados remotamente<br \/>\npor un atacante que pueden ser utilizados en conjunto para realizar actividades maliciosas<br \/>\ncomo env\u00edo de spam, ataques de DDoS, etc.<br \/>\nLas botnets se caracterizan por tener un servidor central (C&amp;C, de sus siglas en ingl\u00e9s Command &amp; Control) al que se conectan los bots para enviar informaci\u00f3n y recibir comandos.<br \/>\nExisten tambi\u00e9n las llamadas botnets P2P que se caracterizan por carecer de un servidor C&amp;C<br \/>\n\u00fanico.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Una botnet es un conjunto de ordenadores (denominados bots) controlados remotamente por un atacante que pueden ser utilizados en conjunto para realizar actividades maliciosas como env\u00edo de spam, ataques de DDoS, etc. Las botnets se caracterizan por tener un servidor central (C&amp;C, de sus siglas en ingl\u00e9s Command &amp; Control) al que se conectan los&hellip;&nbsp;<a href=\"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/\" rel=\"bookmark\">Leer m\u00e1s &raquo;<span class=\"screen-reader-text\">Botnet<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"template":"","glossary-cat":[],"class_list":["post-1237","glossary","type-glossary","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Botnet - Kaymera by Invict<\/title>\n<meta name=\"description\" content=\"Conjunto de ordenadores controlados remotamentepor un atacante que pueden ser utilizados en conjunto para realizar actividades maliciosas\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Botnet - Kaymera by Invict\" \/>\n<meta property=\"og:description\" content=\"Conjunto de ordenadores controlados remotamentepor un atacante que pueden ser utilizados en conjunto para realizar actividades maliciosas\" \/>\n<meta property=\"og:url\" content=\"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/\" \/>\n<meta property=\"og:site_name\" content=\"Kaymera by Invict\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/\",\"url\":\"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/\",\"name\":\"Botnet - Kaymera by Invict\",\"isPartOf\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/#website\"},\"datePublished\":\"2020-10-22T06:55:59+00:00\",\"description\":\"Conjunto de ordenadores controlados remotamentepor un atacante que pueden ser utilizados en conjunto para realizar actividades maliciosas\",\"breadcrumb\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/invict.com.co\/kaymera\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossary\",\"item\":\"https:\/\/invict.com.co\/kaymera\/glosario\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Botnet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/#website\",\"url\":\"https:\/\/invict.com.co\/kaymera\/\",\"name\":\"Kaymera by Invict\",\"description\":\"High-end mobile security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/invict.com.co\/kaymera\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Botnet - Kaymera by Invict","description":"Conjunto de ordenadores controlados remotamentepor un atacante que pueden ser utilizados en conjunto para realizar actividades maliciosas","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/","og_locale":"es_ES","og_type":"article","og_title":"Botnet - Kaymera by Invict","og_description":"Conjunto de ordenadores controlados remotamentepor un atacante que pueden ser utilizados en conjunto para realizar actividades maliciosas","og_url":"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/","og_site_name":"Kaymera by Invict","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/","url":"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/","name":"Botnet - Kaymera by Invict","isPartOf":{"@id":"https:\/\/invict.com.co\/kaymera\/#website"},"datePublished":"2020-10-22T06:55:59+00:00","description":"Conjunto de ordenadores controlados remotamentepor un atacante que pueden ser utilizados en conjunto para realizar actividades maliciosas","breadcrumb":{"@id":"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/invict.com.co\/kaymera\/glosario\/botnet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/invict.com.co\/kaymera\/"},{"@type":"ListItem","position":2,"name":"Glossary","item":"https:\/\/invict.com.co\/kaymera\/glosario\/"},{"@type":"ListItem","position":3,"name":"Botnet"}]},{"@type":"WebSite","@id":"https:\/\/invict.com.co\/kaymera\/#website","url":"https:\/\/invict.com.co\/kaymera\/","name":"Kaymera by Invict","description":"High-end mobile security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/invict.com.co\/kaymera\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/glossary\/1237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":0,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/glossary\/1237\/revisions"}],"wp:attachment":[{"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/media?parent=1237"}],"wp:term":[{"taxonomy":"glossary-cat","embeddable":true,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/glossary-cat?post=1237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}