Skip to content

Latest commit

 

History

History
532 lines (287 loc) · 11.2 KB

history-of-malware.md

File metadata and controls

532 lines (287 loc) · 11.2 KB
description
Join this room to learn about the first forms of malware and how they turned into the malicious code we see today.

🔍 History of Malware

{% embed url="https://tryhackme.com/room/historyofmalware" %} https://tryhackme.com/room/historyofmalware {% endembed %}

Room Attributes Value
Subscription Required False [Free]
Type Walkthrough
Difficulty Info
Tags Security, Walkthrough, Malware, History

Video Walkthrough

{% embed url="https://youtu.be/WZf4LrOwXcE" %} TryHackMe History of Malware Official Walkthrough {% endembed %}

Task 1 - Introduction

Read the above.

{% hint style="success" %} No answer needed {% endhint %}

Task 2 - The Creeper Program

Read the above.

{% hint style="success" %} No answer needed {% endhint %}

Who re-designed the Creeper Virus?

Reveal Flag 🚩

🚩Ray Tomlinson

How is data transferred through a network?

{% hint style="warning" %} HINT: It is a form of switching. {% endhint %}

Reveal Flag 🚩

🚩Packet Switching

Who created the first concept of a virus?

{% hint style="warning" %} HINT: He also created a computer architecture. {% endhint %}

Reveal Flag 🚩

🚩John von Neumann

What text did the Creeper program print to the screen?

{% hint style="warning" %} HINT: This includes correct grammar. {% endhint %}

Reveal Flag 🚩

🚩I'm the Creeper, catch me if you can!

What does ARPANET stand for?

Reveal Flag 🚩

🚩Advanced Research Projects Agency Network

Which team created the network control program?

Reveal Flag 🚩

🚩Network Working Group

What is the first virus commonly known as?

Reveal Flag 🚩

🚩Creeper

Task 3 - Reaper

Read the above.

{% hint style="success" %} No answer needed {% endhint %}

Who created Reaper?

Reveal Flag 🚩

🚩Ray Tomlinson

What type of malware may Reaper be known as?

{% hint style="warning" %} HINT: This is covered towards the end of the page. {% endhint %}

Reveal Flag 🚩

🚩Nematode

What was the first ever anti-virus program known as?

Reveal Flag 🚩

🚩Reaper

What was Bob Thomas' main project to develop?

Reveal Flag 🚩

🚩A resource-sharing capability

Research: What does API stand for?

{% hint style="warning" %} HINT: Google (The resource was given) {% endhint %}

Reveal Flag 🚩

🚩Application Programming Interface

\

Task 4 - Wabbit

Read the information.

{% hint style="success" %} No answer needed {% endhint %}

What is a modern day fork bomb also known as?

Reveal Flag 🚩

🚩Denial of service attack

Was Rabbit one of the first malicious programs? (Y/N)

Reveal Flag 🚩

🚩Y

What did the name "Wabbit" derive from?

{% hint style="warning" %} HINT: Name of the cartoon. {% endhint %}

Reveal Flag 🚩

🚩Looney Tunes Cartoons

Task 5 - ANIMAL

Read the above

{% hint style="success" %} No answer needed {% endhint %}

When was PERVADE added to ANIMAL?

Reveal Flag 🚩

🚩1975

Did John think this was a good idea? (Y/N)

Reveal Flag 🚩

🚩Y

What computers did the program spread across?

Reveal Flag 🚩

🚩UNIVACs

What type of malware is ANIMAL also known as?

Reveal Flag 🚩

🚩A Trojan

Who built the wooden horse?

{% hint style="warning" %} HINT: Start answer with "The" {% endhint %}

Reveal Flag 🚩

🚩The Greeks

Task 6 - Elk Cloner

Read the above.

{% hint style="success" %} No answer needed {% endhint %}

Which US Military regiment caught the virus?

Reveal Flag 🚩

🚩US Navy

How many lines long is the Elk Cloner poem?

Reveal Flag 🚩

🚩7

When was Elk Cloner written?

Reveal Flag 🚩

🚩1982

Is a boot sector virus more or less common in modern technology?

Reveal Flag 🚩

🚩less

How long did it take Richard to write the program?

Reveal Flag 🚩

🚩2 Weeks

Which Operating System was affected?

Reveal Flag 🚩

🚩Apple II

Task 7 - The Morris Internet Worm

Read the above.

{% hint style="success" %} No answer needed {% endhint %}

What commands were a very big way that allowed Morris to access the computers?

{% hint style="warning" %} HINT: Full Name. {% endhint %}

Reveal Flag 🚩

🚩Berkeley r-commands

Who was one the first person prosecuted for the computer misuse act?

{% hint style="warning" %} HINT: Full name... {% endhint %}

Reveal Flag 🚩

🚩Robert Tappan Morris

What type of attack is a "Fork Bomb"?

Reveal Flag 🚩

🚩Denial of Service

When was this worm released?

Reveal Flag 🚩

🚩1988

How many computers did it infect within 15 hours?

Reveal Flag 🚩

🚩2000

What does rsh mean?

Reveal Flag 🚩

🚩remote shell

Under which act was Morris arrested for?

Reveal Flag 🚩

🚩1986 Computer Fraud and Abuse act

Task 8 - Cascade

Read the above.

{% hint style="success" %} No answer needed {% endhint %}

What was the name of this virus?

Reveal Flag 🚩

🚩Cascade

What file extensions would this virus infect?

Reveal Flag 🚩

🚩.COM

How many variants of there virus were possibly found?

Reveal Flag 🚩

🚩40

What operating system would the virus run on?

Reveal Flag 🚩

🚩DOS

Which Operating System/Frame Work would Cascade try to avoid?

Reveal Flag 🚩

🚩IBM

How many bytes would be added onto your file if it got infected?

Reveal Flag 🚩

🚩1704

Task 9 - Thanks for reading!

Thanks!

{% hint style="success" %} No answer needed {% endhint %}