
75
Chapter 6
Technical Introduction
to Bots
e bots documented in this portion of the book have been selected for their
historical importance, prevalence in the wild, important incidents, or notable
technical features. ese case study examples are not comprehensive by design.
Our goal is to generally describe relevant families of selected malicious code and
t
he details pertinent to each investigation. Examples of how bots are installed on
computers (such as user interaction—tricking and double clicking), exploits, and
similar vectors are anecdotally included in this chapter.
6.1 Common Ports
By the late 1990s, Trojans were moving ...