
22 ◾ Malicious Bots
happened to encounter a computer that was infected with the TK IRC bot. Similar
to what we did, he analyzed the bot and figured out that it connected to an IRC
server as its command and control mechanism. Out of curiosity, Seth connected to
t
he IRC server and encountered a suspect on the IRC, who eventually claimed to
be the author of the IRC bot. Seth proceeded to have an online dialog with the sus-
pect and eventually told him he was going to write an article about the experience.
e suspect agreed to provide limited information to Seth in return for editing
rights and on the condition that Seth did not disclose the IP ...