TryHackMe: History of Malware Walkthrough.
You can access the room through this link: https://tryhackme.com/room/historyofmalware
Task 1 :- Introduction
Read the above. → No answer needed.
Task 2 The Creeper Program
Who re-designed the Creeper Virus? → Ray Tomlinson
Hint :- It is a form of switching.
How is data transferred through a network? → Packet Switching
Hint :- He also created a computer architecture.
Who created the first concept of a virus? → John von Neumann
Hint :- This includes correct grammar.
What text did the Creeper program print to the screen? → I’m the creeper, catch me if you can!
What does ARPANET stand for? → Advanced Research Projects Agency Network
Which team created the network control program? → Network Working Group
What is the first virus commonly known as? → Creeper
Task 3 :- Reaper
Who created Reaper? → Ray Tomlinson
Hint :- This is covered towards the end of the page.
What type of malware may Reaper be known as? → Nematode
What was the first ever anti-virus program known as? → Reaper
What was Bob Thomas’ main project to develop? → A resource-sharing capability
Hint :- Google (The resource was given)
Research: What does API stand for? → Application Programming Interface
Task 4 :- Wabbit
When was PERVADE added to ANIMAL? → 1975
Was Rabbit one of the first malicious programs? (Y/N) → Y
Hint :- Name of the cartoon.
What did the name “Wabbit” derive from? → looney tunes cartoons
Task 5 :- ANIMAL
When was PERVADE added to ANIMAL? → 1975
Did John think this was a good idea? (Y/N) → Y
What computers did the program spread across? → UNIVACs
What type of malware is ANIMAL also known as? → a Trojan
Hint :- Start answer with “The”
Who built the wooden horse? → the Greeks
Task 6 :- Elk Cloner
Which US Military regiment caught the virus? → US navy
How many lines long is the Elk Cloner poem? → 7
When was Elk Cloner written? → 1982
Is a boot sector virus more or less common in modern technology? → less
How long did it take Richard to write the program? → 2 weeks
Which Operating System was affected? → Apple ii
Task 7 :- The Morris Internet Worm
Hint :- Full Name.
What commands were a very big way that allowed Morris to access the computers? → Berkeley r-commands
Hint :- Full name…
Who was one the first person prosecuted for the computer misuse act? → Robert Tappan Morris
What type of attack is a “Fork Bomb”? → denial of service
When was this worm released? → 1988
How many computers did it infect within 15 hours? → 2000
What does rsh mean? → remote shell
Under which act was Morris arrested for? → 1986 Computer Fraud and Abuse act
Task 8 :- Cascade
What was the name of this virus? → Cascade
What file extensions would this virus infect? → .com
How many variants of there virus were possibly found? → 40
What operating system would the virus run on? → DOS
Which Operating System/Frame Work would Cascade try to avoid? → IBM
How many bytes would be added onto your file if it got infected? → 1704
Thanks for reading hope you guys like. Post your questions in the comment section below!