摘要: Computer criminals regularly construct large distributed attack networks comprised of many thousands compromised computers around the globe. Once constituted, these are used to perform computer crimes, creating yet other sets victims secondary such as denial service attacks, spam delivery, theft personal and financial information for performing fraud, exfiltration proprietary competitive advantage (industrial espionage), etc. The arms race between criminal actors who create operate botnets security industry research community actively trying take down is escalating in aggressiveness. As sophistication level botnet engineering operations increases, so does demand on reverse engineering, understanding weaknesses design that can be exploited defensive (or counter-offensive) side, possibility actions or eradicate may cause unintended consequences.