đŸš©
THM Walkthroughs
  • THM Walkthroughs
    • đŸ§‘â€đŸ«Tutorial
  • 🟩Difficulty: Info
    • 🔌What is Networking?
    • 🔌Intro to LAN
    • 🐧Linux Fundamentals
      • 🐧Linux Fundamentals Part 1
        • Task 2 - A Bit of Background on Linux
        • Task 4 - Running Your First few Commands
        • Task 5 - Interacting With the Filesystem!
        • Task 6 - Searching for Files
        • Task 7 - An Introduction to Shell Operators
      • 🐧Linux Fundamentals Part 2
        • Task 3 - Introduction to Flags and Switches
        • Task 4 - Filesystem Interaction Continued
        • Task 5 - Permissions 101
        • Task 6 - Common Directories
      • 🐧Linux Fundamentals Part 3
        • Task 3 - Terminal Text Editors
        • Task 4 - General/Useful Utilities
        • Task 5 - Processes 101
        • Task 6 - Maintaining Your System: Automation
        • Task 8 - Maintaining Your System: Logs
    • đŸȘŸWindows Fundamentals
      • đŸȘŸWindows Fundamentals 1
      • đŸȘŸWindows Fundamentals 2
      • đŸȘŸWindows Fundamentals 3
    • 🔓Principles of Security
    • 🐍Python Basics
    • 🔍History of Malware
    • đŸŠčCommon Attacks
    • đŸ–„ïžSecurity Awareness
    • ⚔Intro to Offensive Security
    • đŸŠčPentesting Fundamentals
    • 🔓CVE Walkthroughs
      • đŸ–„ïžSudo Security Bypass: CVE-2019-14287
      • đŸ–„ïžSudo Buffer Overflow: CVE-2019-18634
      • đŸ–„ïžBaron Samedit: CVE-2021-3156
      • đŸ–„ïžOverlayFS: CVE-2021-3493
      • đŸ–„ïžPolkit: CVE-2021-3560
      • đŸ–„ïžPwnkit: CVE-2021-4034
      • đŸȘ¶Apache HTTP Server Path Traversal: CVE-2021-41773/42013
      • đŸ§»Dirty Pipe: CVE-2022-0847
      • 🟱Spring4Shell: CVE-2022-22965
    • 🟧Burp Suite
      • 🟧Burp Suite: The Basics
      • 🟧Burp Suite: Repeater
    • 🏁Challenges
      • ‎Bypass Disable Functions
    • đŸŽŸïžTHM PROMOs
      • đŸŽŸïžLearn and win prizes [PROMO ENDED]
      • đŸŽŸïžLearn and win prizes #2 [PROMO ENDED]
  • đŸŸ©Difficulty: Easy
    • 🚀Learning Cyber Security
    • 🔁The Hacker Methodology
    • 🔍Google Dorking
      • Task 2 - Let's Learn About Crawlers
      • Task 4 - Beepboop - Robots.txt
      • Task 5 - Sitemaps
      • Task 6 - What is Google Dorking?
    • 🐝OWASP Top 10
      • Task 5 - Command Injection Practical
      • Task 7 - Broken Authentication Practical
      • Task 11 - Sensitive Data Exposure (Challenge)
      • Task 13 - XML External Entity - eXtensible Markup Language
      • Task 14 - XML External Entity - DTD
      • Task 16 - XML External Entity - Exploiting
      • Task 18 - Broken Access Control (IDOR Challenge)
      • Task 19 - Security Misconfiguration
      • Task 20 - Cross-site Scripting
      • Task 21 - Insecure Deserialization
      • Task 24 - Insecure Deserialization - Cookies
      • Task 25 - Insecure Deserialization - Cookies Practical
      • Task 30 - Insufficient Logging and Monitoring
    • 📡Nmap
      • Task 2 - Introduction
      • Task 3 - Nmap Switches
      • Task 5 - TCP Connect Scans
      • Task 6 - Scan Types SYN Scans
      • Task 7 - UDP Scans
      • Task 8 - NULL, FIN and Xmas
      • Task 9 - ICMP Network Scanning
      • Task 10 - NSE Scripts Overview
      • Task 11 - Working with the NSE
      • Task 12 - Searching for Scripts
      • Task 13 - Firewall Evasion
      • Task 14 - Practical
    • 📡RustScan
      • Task 2 - Installing RustScan
      • Task 5 - Extensible
      • Task 7 - Scanning Time!
      • Task 8 - RustScan Quiz
    • 🐙Crack the hash
    • 🌍OhSINT
    • 🧑‍🚀Vulnversity
    • 🧊Ice
    • đŸȘŸBlue
    • 🎄Advent of Cyber 4 (2022)
  • 🟹Difficulty: Medium
    • đŸȘŸAttacktive Directory
      • Task 3 - Welcome to Attacktive Directory
      • Task 4 - Enumerating Users via Kerberos
      • Task 5 - Abusing Kerberos
      • Task 6 - Back to the Basics
      • Task 7 - Elevating Privileges within the Domain
      • Task 8 - Flag Submission Panel
    • 💀Mr Robot CTF
    • 🛗Linux PrivEsc
    • 🛗Linux PrivEsc Arena [WIP]
    • 🛗Windows PrivEsc Arena
  • 🟧Difficulty: Hard
    • 🐘Hacking Hadoop [WIP]
  • đŸŸ„Difficulty: Insane
    • â›șYou're in a cave [WIP]
  • Blank Room (Duplicate Me)
Powered by GitBook
On this page
  • Video Walkthrough
  • Task 1 - Introduction
  • Read the above.
  • Task 2 - The Creeper Program
  • Read the above.
  • Who re-designed the Creeper Virus?
  • How is data transferred through a network?
  • Who created the first concept of a virus?
  • What text did the Creeper program print to the screen?
  • What does ARPANET stand for?
  • Which team created the network control program?
  • What is the first virus commonly known as?
  • Task 3 - Reaper
  • Read the above.
  • Who created Reaper?
  • What type of malware may Reaper be known as?
  • What was the first ever anti-virus program known as?
  • What was Bob Thomas' main project to develop?
  • Research: What does API stand for?
  • Task 4 - Wabbit
  • Read the information.
  • What is a modern day fork bomb also known as?
  • Was Rabbit one of the first malicious programs? (Y/N)
  • What did the name "Wabbit" derive from?
  • Task 5 - ANIMAL
  • Read the above
  • When was PERVADE added to ANIMAL?
  • Did John think this was a good idea? (Y/N)
  • What computers did the program spread across?
  • What type of malware is ANIMAL also known as?
  • Who built the wooden horse?
  • Task 6 - Elk Cloner
  • Read the above.
  • Which US Military regiment caught the virus?
  • How many lines long is the Elk Cloner poem?
  • When was Elk Cloner written?
  • Is a boot sector virus more or less common in modern technology?
  • How long did it take Richard to write the program?
  • Which Operating System was affected?
  • Task 7 - The Morris Internet Worm
  • Read the above.
  • What commands were a very big way that allowed Morris to access the computers?
  • Who was one the first person prosecuted for the computer misuse act?
  • What type of attack is a "Fork Bomb"?
  • When was this worm released?
  • How many computers did it infect within 15 hours?
  • What does rsh mean?
  • Under which act was Morris arrested for?
  • Task 8 - Cascade
  • Read the above.
  • What was the name of this virus?
  • What file extensions would this virus infect?
  • How many variants of there virus were possibly found?
  • What operating system would the virus run on?
  • Which Operating System/Frame Work would Cascade try to avoid?
  • How many bytes would be added onto your file if it got infected?
  • Task 9 - Thanks for reading!
  • Thanks!
  1. Difficulty: Info

History of Malware

Join this room to learn about the first forms of malware and how they turned into the malicious code we see today.

PreviousPython BasicsNextCommon Attacks

Last updated 2 years ago

Room Attributes
Value

Subscription Required

False [Free]

Type

Walkthrough

Difficulty

Info

Tags

Security, Walkthrough, Malware, History

Video Walkthrough

Task 1 - Introduction

Read the above.

No answer needed

Task 2 - The Creeper Program

Read the above.

No answer needed

Who re-designed the Creeper Virus?

How is data transferred through a network?

HINT: It is a form of switching.

Who created the first concept of a virus?

HINT: He also created a computer architecture.

What text did the Creeper program print to the screen?

HINT: This includes correct grammar.

What does ARPANET stand for?

Which team created the network control program?

What is the first virus commonly known as?

Task 3 - Reaper

Read the above.

No answer needed

Who created Reaper?

What type of malware may Reaper be known as?

HINT: This is covered towards the end of the page.

What was the first ever anti-virus program known as?

What was Bob Thomas' main project to develop?

Research: What does API stand for?

HINT: Google (The resource was given)

Task 4 - Wabbit

Read the information.

No answer needed

What is a modern day fork bomb also known as?

Was Rabbit one of the first malicious programs? (Y/N)

What did the name "Wabbit" derive from?

HINT: Name of the cartoon.

Task 5 - ANIMAL

Read the above

No answer needed

When was PERVADE added to ANIMAL?

Did John think this was a good idea? (Y/N)

What computers did the program spread across?

What type of malware is ANIMAL also known as?

Who built the wooden horse?

HINT: Start answer with "The"

Task 6 - Elk Cloner

Read the above.

No answer needed

Which US Military regiment caught the virus?

How many lines long is the Elk Cloner poem?

When was Elk Cloner written?

Is a boot sector virus more or less common in modern technology?

How long did it take Richard to write the program?

Which Operating System was affected?

Task 7 - The Morris Internet Worm

Read the above.

No answer needed

What commands were a very big way that allowed Morris to access the computers?

HINT: Full Name.

Who was one the first person prosecuted for the computer misuse act?

HINT: Full name...

What type of attack is a "Fork Bomb"?

When was this worm released?

How many computers did it infect within 15 hours?

What does rsh mean?

Under which act was Morris arrested for?

Task 8 - Cascade

Read the above.

No answer needed

What was the name of this virus?

What file extensions would this virus infect?

How many variants of there virus were possibly found?

What operating system would the virus run on?

Which Operating System/Frame Work would Cascade try to avoid?

How many bytes would be added onto your file if it got infected?

Task 9 - Thanks for reading!

Thanks!

No answer needed

Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag

Ray Tomlinson

Packet Switching

John von Neumann

I'm the Creeper, catch me if you can!

Advanced Research Projects Agency Network

Network Working Group

Creeper

Ray Tomlinson

Nematode

Reaper

A resource-sharing capability

Application Programming Interface

Denial of service attack

Y

Looney Tunes Cartoons

1975

Y

UNIVACs

A Trojan

The Greeks

US Navy

7

1982

less

2 Weeks

Apple II

Berkeley r-commands

Robert Tappan Morris

Denial of Service

1988

2000

remote shell

1986 Computer Fraud and Abuse act

Cascade

.COM

40

DOS

IBM

1704

🟩
🔍
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
TryHackMe | History of MalwareTryHackMe
https://tryhackme.com/room/historyofmalware
TryHackMe History of Malware Official Walkthrough
Logo