Home History of Malware
Post
Cancel

History of Malware

Join this room to learn about the first forms of malware and how they turned into the malicious code we see today.

THM Room https://tryhackme.com/room/historyofmalware

TASK 1 : Introduction

Read the above.

No Answer.

TASK 2 : The Creeper Program

Read the above.

No Answer, just carefully read the text to answer next questions.

Who re-designed the Creeper Virus?

Answe : Ray Tomlinson

How is data transferred through a network?

Answe : Packet Switching

Who created the first concept of a virus?

Answe : John von Neumann

What text did the Creeper program print to the screen?

Answe : I’m the creeper, catch me if you can!

What does ARPANET stand for?

Answe : Advanced Research Projects Agency Network

Which team created the network control program?

Answe : Network Working Group

What is the first virus commonly known as?

Answe : Creeper

TASK 3 : Reaper

Read the above.

Read carefully the text.

Who created Reaper?

Answer : Ray Tomlinson

What type of malware may Reaper be known as?

Answer : nematode

What was the first ever anti-virus program known as?

Answer : Reaper

What was Bob Thomas’ main project to develop?

Answer : a resource-sharing capability

Research: What does API stand for?

Answer : Application Programming Interface

TASK 4 : Wabbit

Read the information.

No Answer.

What is a modern day fork bomb also known as?

Answer : a denial of service attack

Was Rabbit one of the first malicious programs? (Y/N)

Answer : Y

What did the name “Wabbit” derive from?

Answer : looney tunes cartoons

TASK 5 : ANIMAL

Read the above.

No Answer.

When was PERVADE added to ANIMAL?

Answer : 1975

Did John think this was a good idea? (Y/N)

Answer : Y

What computers did the program spread across?

Answer : UNIVACs

What type of malware is ANIMAL also known as?

Answer : a trojan

Who built the wooden horse?

Answer : the Greeks

TASK 6 : Elk Cloner

Read the above.

no Answer.

Which US Military regiment caught the virus?

Answer : US NAVY

How many lines long is the Elk Cloner poem?

Answer : 7

When was Elk Cloner written?

Answer : 1982

Is a boot sector virus more or less common in modern technology?

Answer : less

How long did it take Richard to write the program?

Answer : 2 weeks

Which Operating System was affected?

Answer : Apple II

TASK 7 : The Morris Internet Worm

Read the above.

No Answer.

What commands were a very big way that allowed Morris to access the computers?

Answer : Berkeley r-commands

Who was one the first person prosecuted for the computer misuse act?

Answer : Robert Tappan Morris

What type of attack is a “Fork Bomb”?

Answer : Denial of services

When was this worm released?

Answer : 1988

How many computers did it infect within 15 hours?

Answer : 2000

What does rsh mean?

Answer : remote shell

Under which act was Morris arrested for?

Answer : 1986 Computer Fraud and Abuse act

TASK 8 : Cascade

Read the above.

No Answer.

What was the name of this virus?

Answer : Cascade

What file extensions would this virus infect?

Answer : .com

How many variants of there virus were possibly found?

Answer : 40

What operating system would the virus run on?

Answer : DOS

Which Operating System/Frame Work would Cascade try to avoid?

Answer : IBM

How many bytes would be added onto your file if it got infected?

Answer : 1704

TASK 9 : Thanks for reading!

Thanks!

No Answer.

This post is licensed under CC BY 4.0 by the author.