We infiltrated an IRC botnet. Here’s what we found | CyberNews
By further more analyzing the code, researchers observed that the destructive plan was able to carry out DDoS attacks more than UDP, TCP, HTTP, and other protocols and to execute commands.