πŸ”History of Malware

Join this room to learn about the first forms of malware and how they turned into the malicious code we see today.

https://tryhackme.com/room/historyofmalwarearrow-up-right

Room Attributes
Value

Subscription Required

False [Free]

Type

Walkthrough

Difficulty

Info

Tags

Security, Walkthrough, Malware, History

Video Walkthrough

TryHackMe History of Malware Official Walkthrough

Task 1 - Introduction

Read the above.

circle-check

Task 2 - The Creeper Program

Read the above.

circle-check

Who re-designed the Creeper Virus?

chevron-rightReveal Flag 🚩hashtag

🚩Ray Tomlinson

How is data transferred through a network?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩Packet Switching

Who created the first concept of a virus?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩John von Neumann

What text did the Creeper program print to the screen?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩I'm the Creeper, catch me if you can!

What does ARPANET stand for?

chevron-rightReveal Flag 🚩hashtag

🚩Advanced Research Projects Agency Network

Which team created the network control program?

chevron-rightReveal Flag 🚩hashtag

🚩Network Working Group

What is the first virus commonly known as?

chevron-rightReveal Flag 🚩hashtag

🚩Creeper

Task 3 - Reaper

Read the above.

circle-check

Who created Reaper?

chevron-rightReveal Flag 🚩hashtag

🚩Ray Tomlinson

What type of malware may Reaper be known as?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩Nematode

What was the first ever anti-virus program known as?

chevron-rightReveal Flag 🚩hashtag

🚩Reaper

What was Bob Thomas' main project to develop?

chevron-rightReveal Flag 🚩hashtag

🚩A resource-sharing capability

Research: What does API stand for?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩Application Programming Interface

Task 4 - Wabbit

Read the information.

circle-check

What is a modern day fork bomb also known as?

chevron-rightReveal Flag 🚩hashtag

🚩Denial of service attack

Was Rabbit one of the first malicious programs? (Y/N)

chevron-rightReveal Flag 🚩hashtag

🚩Y

What did the name "Wabbit" derive from?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩Looney Tunes Cartoons

Task 5 - ANIMAL

Read the above

circle-check

When was PERVADE added to ANIMAL?

chevron-rightReveal Flag 🚩hashtag

🚩1975

Did John think this was a good idea? (Y/N)

chevron-rightReveal Flag 🚩hashtag

🚩Y

What computers did the program spread across?

chevron-rightReveal Flag 🚩hashtag

🚩UNIVACs

What type of malware is ANIMAL also known as?

chevron-rightReveal Flag 🚩hashtag

🚩A Trojan

Who built the wooden horse?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩The Greeks

Task 6 - Elk Cloner

Read the above.

circle-check

Which US Military regiment caught the virus?

chevron-rightReveal Flag 🚩hashtag

🚩US Navy

How many lines long is the Elk Cloner poem?

chevron-rightReveal Flag 🚩hashtag

🚩7

When was Elk Cloner written?

chevron-rightReveal Flag 🚩hashtag

🚩1982

Is a boot sector virus more or less common in modern technology?

chevron-rightReveal Flag 🚩hashtag

🚩less

How long did it take Richard to write the program?

chevron-rightReveal Flag 🚩hashtag

🚩2 Weeks

Which Operating System was affected?

chevron-rightReveal Flag 🚩hashtag

🚩Apple II

Task 7 - The Morris Internet Worm

Read the above.

circle-check

What commands were a very big way that allowed Morris to access the computers?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩Berkeley r-commands

Who was one the first person prosecuted for the computer misuse act?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩Robert Tappan Morris

What type of attack is a "Fork Bomb"?

chevron-rightReveal Flag 🚩hashtag

🚩Denial of Service

When was this worm released?

chevron-rightReveal Flag 🚩hashtag

🚩1988

How many computers did it infect within 15 hours?

chevron-rightReveal Flag 🚩hashtag

🚩2000

What does rsh mean?

chevron-rightReveal Flag 🚩hashtag

🚩remote shell

Under which act was Morris arrested for?

chevron-rightReveal Flag 🚩hashtag

🚩1986 Computer Fraud and Abuse act

Task 8 - Cascade

Read the above.

circle-check

What was the name of this virus?

chevron-rightReveal Flag 🚩hashtag

🚩Cascade

What file extensions would this virus infect?

chevron-rightReveal Flag 🚩hashtag

🚩.COM

How many variants of there virus were possibly found?

chevron-rightReveal Flag 🚩hashtag

🚩40

What operating system would the virus run on?

chevron-rightReveal Flag 🚩hashtag

🚩DOS

Which Operating System/Frame Work would Cascade try to avoid?

chevron-rightReveal Flag 🚩hashtag

🚩IBM

How many bytes would be added onto your file if it got infected?

chevron-rightReveal Flag 🚩hashtag

🚩1704

Task 9 - Thanks for reading!

Thanks!

circle-check

Last updated