Post compromise – botnets and DDoS attacks