description |
---|
Join this room to learn about the first forms of malware and how they turned into the malicious code we see today. |
{% embed url="https://tryhackme.com/room/historyofmalware" %} https://tryhackme.com/room/historyofmalware {% endembed %}
Room Attributes | Value |
---|---|
Subscription Required | False [Free] |
Type | Walkthrough |
Difficulty | Info |
Tags | Security, Walkthrough, Malware, History |
{% embed url="https://youtu.be/WZf4LrOwXcE" %} TryHackMe History of Malware Official Walkthrough {% endembed %}
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩Ray Tomlinson
{% hint style="warning" %} HINT: It is a form of switching. {% endhint %}
Reveal Flag 🚩
🚩Packet Switching
{% hint style="warning" %} HINT: He also created a computer architecture. {% endhint %}
Reveal Flag 🚩
🚩John von Neuma
nn
{% hint style="warning" %} HINT: This includes correct grammar. {% endhint %}
Reveal Flag 🚩
🚩I'm the Creeper, catch me if you can!
Reveal Flag 🚩
🚩Advanced Research Projects Agency Network
Reveal Flag 🚩
🚩Network Working Group
Reveal Flag 🚩
🚩Creeper
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩Ray Tomlinson
{% hint style="warning" %} HINT: This is covered towards the end of the page. {% endhint %}
Reveal Flag 🚩
🚩Nematode
Reveal Flag 🚩
🚩Reaper
Reveal Flag 🚩
🚩A resource-sharing capability
{% hint style="warning" %} HINT: Google (The resource was given) {% endhint %}
Reveal Flag 🚩
🚩Application Programming Interface
\
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩Denial of service attack
Reveal Flag 🚩
🚩Y
{% hint style="warning" %} HINT: Name of the cartoon. {% endhint %}
Reveal Flag 🚩
🚩Looney Tunes Cartoons
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩1975
Reveal Flag 🚩
🚩Y
Reveal Flag 🚩
🚩UNIVACs
Reveal Flag 🚩
🚩A Trojan
{% hint style="warning" %} HINT: Start answer with "The" {% endhint %}
Reveal Flag 🚩
🚩The Greeks
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩US Navy
Reveal Flag 🚩
🚩7
Reveal Flag 🚩
🚩1982
Reveal Flag 🚩
🚩less
Reveal Flag 🚩
🚩2 Weeks
Reveal Flag 🚩
🚩Apple II
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="warning" %} HINT: Full Name. {% endhint %}
Reveal Flag 🚩
🚩Berkeley r-commands
{% hint style="warning" %} HINT: Full name... {% endhint %}
Reveal Flag 🚩
🚩Robert Tappan Morris
Reveal Flag 🚩
🚩Denial of Service
Reveal Flag 🚩
🚩1988
Reveal Flag 🚩
🚩2000
Reveal Flag 🚩
🚩remote shell
Reveal Flag 🚩
🚩1986 Computer Fraud and Abuse act
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩Cascade
Reveal Flag 🚩
🚩.COM
Reveal Flag 🚩
🚩40
Reveal Flag 🚩
🚩DOS
Reveal Flag 🚩
🚩IBM
Reveal Flag 🚩
🚩1704
{% hint style="success" %} No answer needed {% endhint %}