
33
Chapter 3
Demonstration:
How a Hacker Launches
a Botnet Attack
A multitude of sources talk about various types of bots and their features but fail
to demonstrate how hackers actually perform bot attacks in the wild. is section
introduces several subjects that can be quite complicated, such as how to modify
code and compile a binary (a bot executable). However, we have attempted to
p
rovide an overview that is both technically compelling and thorough enough
without losing less technical audiences. Some more advanced technical data has
been purposely omitted to avoid encouraging possible abuse of this information for
illeg