Join this room to learn about the first forms of malware and how they turned into the malicious code we see today.
THM Room https://tryhackme.com/room/historyofmalware
TASK 1 : Introduction
Read the above.
No Answer.
TASK 2 : The Creeper Program
Read the above.
No Answer, just carefully read the text to answer next questions.
Who re-designed the Creeper Virus?
Answe : Ray Tomlinson
How is data transferred through a network?
Answe : Packet Switching
Who created the first concept of a virus?
Answe : John von Neumann
What text did the Creeper program print to the screen?
Answe : I’m the creeper, catch me if you can!
What does ARPANET stand for?
Answe : Advanced Research Projects Agency Network
Which team created the network control program?
Answe : Network Working Group
What is the first virus commonly known as?
Answe : Creeper
TASK 3 : Reaper
Read the above.
Read carefully the text.
Who created Reaper?
Answer : Ray Tomlinson
What type of malware may Reaper be known as?
Answer : nematode
What was the first ever anti-virus program known as?
Answer : Reaper
What was Bob Thomas’ main project to develop?
Answer : a resource-sharing capability
Research: What does API stand for?
Answer : Application Programming Interface
TASK 4 : Wabbit
Read the information.
No Answer.
What is a modern day fork bomb also known as?
Answer : a denial of service attack
Was Rabbit one of the first malicious programs? (Y/N)
Answer : Y
What did the name “Wabbit” derive from?
Answer : looney tunes cartoons
TASK 5 : ANIMAL
Read the above.
No Answer.
When was PERVADE added to ANIMAL?
Answer : 1975
Did John think this was a good idea? (Y/N)
Answer : Y
What computers did the program spread across?
Answer : UNIVACs
What type of malware is ANIMAL also known as?
Answer : a trojan
Who built the wooden horse?
Answer : the Greeks
TASK 6 : Elk Cloner
Read the above.
no Answer.
Which US Military regiment caught the virus?
Answer : US NAVY
How many lines long is the Elk Cloner poem?
Answer : 7
When was Elk Cloner written?
Answer : 1982
Is a boot sector virus more or less common in modern technology?
Answer : less
How long did it take Richard to write the program?
Answer : 2 weeks
Which Operating System was affected?
Answer : Apple II
TASK 7 : The Morris Internet Worm
Read the above.
No Answer.
What commands were a very big way that allowed Morris to access the computers?
Answer : Berkeley r-commands
Who was one the first person prosecuted for the computer misuse act?
Answer : Robert Tappan Morris
What type of attack is a “Fork Bomb”?
Answer : Denial of services
When was this worm released?
Answer : 1988
How many computers did it infect within 15 hours?
Answer : 2000
What does rsh mean?
Answer : remote shell
Under which act was Morris arrested for?
Answer : 1986 Computer Fraud and Abuse act
TASK 8 : Cascade
Read the above.
No Answer.
What was the name of this virus?
Answer : Cascade
What file extensions would this virus infect?
Answer : .com
How many variants of there virus were possibly found?
Answer : 40
What operating system would the virus run on?
Answer : DOS
Which Operating System/Frame Work would Cascade try to avoid?
Answer : IBM
How many bytes would be added onto your file if it got infected?
Answer : 1704
TASK 9 : Thanks for reading!
Thanks!
No Answer.