Malware and viruses get more complicated and evasive. Defensive postures concentrate around malware isolation and analysis. But what do hackers see? Taking a page from their playbook we will examine real-life botnet Command and Control systems to see how they function from the inside. Botnet types such as traditional C&C, mobile, RATs, grabbers, injects, and other popular types of hacker tools will be shown to get a better understanding of the hacker back-end platforms and intents for further abuse.