This document discusses the increasing threat of cyber-attacks from botnets and introduces a live detection method for tracking the botmaster within an internal network using metasploit framework. It details a methodological approach that involves monitoring network traffic, identifying compromised machines (zombies), and analyzing the incoming packets to trace back to the botmaster. The proposed framework aims for high detection rates with low computational overhead while highlighting future work for external network application.