This report provides a comprehensive overview of botnets, defining them as networks of compromised devices controlled by malicious actors. It examines various botnet variants, including IRC, P2P, and HTTP botnets, and their architectures, such as centralized, multi-server, hierarchical, and P2P topologies. The report details botnet operations and communication methods, highlighting potential threats like DDoS attacks, spamming, and phishing. It explores mitigation tools and techniques, including employee training and firewalls, and identifies networked applications targeted by botnets, such as email programs, HTTP protocols, and FTP. The report concludes by emphasizing the importance of proactive security measures to protect against botnet attacks. This report, submitted by a student, is available on Desklib, a platform offering AI-powered study tools.