ABSTRACT

A multitude of sources talk about various types of bots and their features but fail to demonstrate how hackers actually perform bot attacks in the wild. is section introduces several subjects that can be quite complicated, such as how to modify code and compile a binary (a bot executable). However, we have attempted to provide an overview that is both technically compelling and thorough enough without losing less technical audiences. Some more advanced technical data has been purposely omitted to avoid encouraging possible abuse of this information for illegal or immoral purposes. Individuals who desire to know about technical topics can contact the authors for additional resources.