🔍History of Malware

Join this room to learn about the first forms of malware and how they turned into the malicious code we see today.

https://tryhackme.com/room/historyofmalware

Room Attributes
Value

Subscription Required

False [Free]

Type

Walkthrough

Difficulty

Info

Tags

Security, Walkthrough, Malware, History

Video Walkthrough

TryHackMe History of Malware Official Walkthrough

Task 1 - Introduction

Read the above.

No answer needed

Task 2 - The Creeper Program

Read the above.

No answer needed

Who re-designed the Creeper Virus?

Reveal Flag đŸš©

đŸš©Ray Tomlinson

How is data transferred through a network?

HINT: It is a form of switching.

Reveal Flag đŸš©

đŸš©Packet Switching

Who created the first concept of a virus?

HINT: He also created a computer architecture.

Reveal Flag đŸš©

đŸš©John von Neumann

What text did the Creeper program print to the screen?

HINT: This includes correct grammar.

Reveal Flag đŸš©

đŸš©I'm the Creeper, catch me if you can!

What does ARPANET stand for?

Reveal Flag đŸš©

đŸš©Advanced Research Projects Agency Network

Which team created the network control program?

Reveal Flag đŸš©

đŸš©Network Working Group

What is the first virus commonly known as?

Reveal Flag đŸš©

đŸš©Creeper

Task 3 - Reaper

Read the above.

No answer needed

Who created Reaper?

Reveal Flag đŸš©

đŸš©Ray Tomlinson

What type of malware may Reaper be known as?

HINT: This is covered towards the end of the page.

Reveal Flag đŸš©

đŸš©Nematode

What was the first ever anti-virus program known as?

Reveal Flag đŸš©

đŸš©Reaper

What was Bob Thomas' main project to develop?

Reveal Flag đŸš©

đŸš©A resource-sharing capability

Research: What does API stand for?

HINT: Google (The resource was given)

Reveal Flag đŸš©

đŸš©Application Programming Interface

Task 4 - Wabbit

Read the information.

No answer needed

What is a modern day fork bomb also known as?

Reveal Flag đŸš©

đŸš©Denial of service attack

Was Rabbit one of the first malicious programs? (Y/N)

Reveal Flag đŸš©

đŸš©Y

What did the name "Wabbit" derive from?

HINT: Name of the cartoon.

Reveal Flag đŸš©

đŸš©Looney Tunes Cartoons

Task 5 - ANIMAL

Read the above

No answer needed

When was PERVADE added to ANIMAL?

Reveal Flag đŸš©

đŸš©1975

Did John think this was a good idea? (Y/N)

Reveal Flag đŸš©

đŸš©Y

What computers did the program spread across?

Reveal Flag đŸš©

đŸš©UNIVACs

What type of malware is ANIMAL also known as?

Reveal Flag đŸš©

đŸš©A Trojan

Who built the wooden horse?

HINT: Start answer with "The"

Reveal Flag đŸš©

đŸš©The Greeks

Task 6 - Elk Cloner

Read the above.

No answer needed

Which US Military regiment caught the virus?

Reveal Flag đŸš©

đŸš©US Navy

How many lines long is the Elk Cloner poem?

Reveal Flag đŸš©

đŸš©7

When was Elk Cloner written?

Reveal Flag đŸš©

đŸš©1982

Is a boot sector virus more or less common in modern technology?

Reveal Flag đŸš©

đŸš©less

How long did it take Richard to write the program?

Reveal Flag đŸš©

đŸš©2 Weeks

Which Operating System was affected?

Reveal Flag đŸš©

đŸš©Apple II

Task 7 - The Morris Internet Worm

Read the above.

No answer needed

What commands were a very big way that allowed Morris to access the computers?

HINT: Full Name.

Reveal Flag đŸš©

đŸš©Berkeley r-commands

Who was one the first person prosecuted for the computer misuse act?

HINT: Full name...

Reveal Flag đŸš©

đŸš©Robert Tappan Morris

What type of attack is a "Fork Bomb"?

Reveal Flag đŸš©

đŸš©Denial of Service

When was this worm released?

Reveal Flag đŸš©

đŸš©1988

How many computers did it infect within 15 hours?

Reveal Flag đŸš©

đŸš©2000

What does rsh mean?

Reveal Flag đŸš©

đŸš©remote shell

Under which act was Morris arrested for?

Reveal Flag đŸš©

đŸš©1986 Computer Fraud and Abuse act

Task 8 - Cascade

Read the above.

No answer needed

What was the name of this virus?

Reveal Flag đŸš©

đŸš©Cascade

What file extensions would this virus infect?

Reveal Flag đŸš©

đŸš©.COM

How many variants of there virus were possibly found?

Reveal Flag đŸš©

đŸš©40

What operating system would the virus run on?

Reveal Flag đŸš©

đŸš©DOS

Which Operating System/Frame Work would Cascade try to avoid?

Reveal Flag đŸš©

đŸš©IBM

How many bytes would be added onto your file if it got infected?

Reveal Flag đŸš©

đŸš©1704

Task 9 - Thanks for reading!

Thanks!

No answer needed

Last updated