CEH

(Jeff_L) #1

272 Chapter 11 ■ Denial of Service


Handler

Master / Attacker

Zombies

Handler

Victim

Handler

FIGURE 11.3 DDoS attack setup

A common method of covertly installing a bot on a handler or client is a Trojan horse
that carries the bot as a payload. Once the handler and subsequent zombies have been
infected, the attacker communicates remotely with the so-called botnet via communication
channels such as Internet Relay Chat (IRC) or Peer-to-Peer (P2P).
Free download pdf