272 Chapter 11 ■ Denial of Service
Handler
Master / Attacker
Zombies
Handler
Victim
Handler
FIGURE 11.3 DDoS attack setup
A common method of covertly installing a bot on a handler or client is a Trojan horse
that carries the bot as a payload. Once the handler and subsequent zombies have been
infected, the attacker communicates remotely with the so-called botnet via communication
channels such as Internet Relay Chat (IRC) or Peer-to-Peer (P2P).