Spring 2015





Preparation for Recitation on Botnets

Read Your Botnet is My Botnet: Analysis of a Botnet Takeover by Stone-Gross, et al. You can skim §5.2.1-§5.2.3.

Please answer the following question:

Explain the key factors that allowed the authors to infiltrate the Torpig botnet. Would their techniques work for all botnets?

Questions or comments regarding 6.033? Send e-mail to the 6.033 staff at .

Top // 6.033 home //