When phoning home to the C&C server, the infected
machine performs a HTTP POST request in which the
bot ID is included. We can easily emulate this kind of requests
by performing a HTTP POST request with an arbitrary
bot ID, for example with the following command
using the command-line tool cURL: