Skip to Main Content
Malicious Bots
book

Malicious Bots

by Ken Dunham, Jim Melnick
August 2008
Intermediate to advanced content levelIntermediate to advanced
168 pages
4h 55m
English
Auerbach Publications
Content preview from Malicious Bots
75
Chapter 6
Technical Introduction
to Bots
e bots documented in this portion of the book have been selected for their
historical importance, prevalence in the wild, important incidents, or notable
technical features. ese case study examples are not comprehensive by design.
Our goal is to generally describe relevant families of selected malicious code and
t
he details pertinent to each investigation. Examples of how bots are installed on
computers (such as user interaction—tricking and double clicking), exploits, and
similar vectors are anecdotally included in this chapter.
6.1 Common Ports
By the late 1990s, Trojans were moving ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi

Publisher Resources

ISBN: 9781420069068