đHistory of Malware
Join this room to learn about the first forms of malware and how they turned into the malicious code we see today.
Room Attributes
Value
Subscription Required
False [Free]
Type
Walkthrough
Difficulty
Info
Tags
Security, Walkthrough, Malware, History
Video Walkthrough
Task 1 - Introduction
Read the above.
No answer needed
Task 2 - The Creeper Program
Read the above.
No answer needed
Who re-designed the Creeper Virus?
How is data transferred through a network?
HINT: It is a form of switching.
Who created the first concept of a virus?
HINT: He also created a computer architecture.
What text did the Creeper program print to the screen?
HINT: This includes correct grammar.
What does ARPANET stand for?
Which team created the network control program?
What is the first virus commonly known as?
Task 3 - Reaper
Read the above.
No answer needed
Who created Reaper?
What type of malware may Reaper be known as?
HINT: This is covered towards the end of the page.
What was the first ever anti-virus program known as?
What was Bob Thomas' main project to develop?
Research: What does API stand for?
HINT: Google (The resource was given)
Task 4 - Wabbit
Read the information.
No answer needed
What is a modern day fork bomb also known as?
Was Rabbit one of the first malicious programs? (Y/N)
What did the name "Wabbit" derive from?
HINT: Name of the cartoon.
Task 5 - ANIMAL
Read the above
No answer needed
When was PERVADE added to ANIMAL?
Did John think this was a good idea? (Y/N)
What computers did the program spread across?
What type of malware is ANIMAL also known as?
Who built the wooden horse?
HINT: Start answer with "The"
Task 6 - Elk Cloner
Read the above.
No answer needed
Which US Military regiment caught the virus?
How many lines long is the Elk Cloner poem?
When was Elk Cloner written?
Is a boot sector virus more or less common in modern technology?
How long did it take Richard to write the program?
Which Operating System was affected?
Task 7 - The Morris Internet Worm
Read the above.
No answer needed
What commands were a very big way that allowed Morris to access the computers?
HINT: Full Name.
Who was one the first person prosecuted for the computer misuse act?
HINT: Full name...
What type of attack is a "Fork Bomb"?
When was this worm released?
How many computers did it infect within 15 hours?
What does rsh mean?
Under which act was Morris arrested for?
Task 8 - Cascade
Read the above.
No answer needed
What was the name of this virus?
What file extensions would this virus infect?
How many variants of there virus were possibly found?
What operating system would the virus run on?
Which Operating System/Frame Work would Cascade try to avoid?
How many bytes would be added onto your file if it got infected?
Task 9 - Thanks for reading!
Thanks!
No answer needed
Last updated