Sitemap

TryHackMe: History of Malware Walkthrough.

amanpatel
3 min readJul 4, 2021
History of Malware Walkthrough.

You can access the room through this link: https://tryhackme.com/room/historyofmalware

Task 1 :- Introduction

Read the above. → No answer needed.

Task 2 The Creeper Program

von Neumann architecture.

Who re-designed the Creeper Virus? → Ray Tomlinson

Hint :- It is a form of switching.
How is data transferred through a network? → Packet Switching

Hint :- He also created a computer architecture.
Who created the first concept of a virus? → John von Neumann

Hint :- This includes correct grammar.
What text did the Creeper program print to the screen? → I’m the creeper, catch me if you can!

What does ARPANET stand for? → Advanced Research Projects Agency Network

Which team created the network control program? → Network Working Group

What is the first virus commonly known as? → Creeper

Task 3 :- Reaper

Who created Reaper? → Ray Tomlinson

Hint :- This is covered towards the end of the page.
What type of malware may Reaper be known as? → Nematode

What was the first ever anti-virus program known as? → Reaper

What was Bob Thomas’ main project to develop? → A resource-sharing capability

Hint :- Google (The resource was given)
Research: What does API stand for? → Application Programming Interface

Task 4 :- Wabbit

When was PERVADE added to ANIMAL? → 1975

Was Rabbit one of the first malicious programs? (Y/N) → Y

Hint :- Name of the cartoon.
What did the name “Wabbit” derive from? → looney tunes cartoons

Task 5 :- ANIMAL

When was PERVADE added to ANIMAL? → 1975

Did John think this was a good idea? (Y/N) → Y

What computers did the program spread across? → UNIVACs

What type of malware is ANIMAL also known as? → a Trojan

Hint :- Start answer with “The”
Who built the wooden horse? → the Greeks

Task 6 :- Elk Cloner

Which US Military regiment caught the virus? → US navy

How many lines long is the Elk Cloner poem? → 7

When was Elk Cloner written? → 1982

Is a boot sector virus more or less common in modern technology? → less

How long did it take Richard to write the program? → 2 weeks

Which Operating System was affected? → Apple ii

Task 7 :- The Morris Internet Worm

Hint :- Full Name.
What commands were a very big way that allowed Morris to access the computers? → Berkeley r-commands

Hint :- Full name…
Who was one the first person prosecuted for the computer misuse act? → Robert Tappan Morris

What type of attack is a “Fork Bomb”? → denial of service

When was this worm released? → 1988

How many computers did it infect within 15 hours? → 2000

What does rsh mean? → remote shell

Under which act was Morris arrested for? → 1986 Computer Fraud and Abuse act

Task 8 :- Cascade

What was the name of this virus? → Cascade

What file extensions would this virus infect? → .com

How many variants of there virus were possibly found? → 40

What operating system would the virus run on? → DOS

Which Operating System/Frame Work would Cascade try to avoid? → IBM

How many bytes would be added onto your file if it got infected? → 1704

Thanks for reading hope you guys like. Post your questions in the comment section below!

--

--

amanpatel
amanpatel

Written by amanpatel

Security Samurai @VerSe_Corporate (Dailyhunt | Josh) | Journey begins:- Novice🤖 To Omniscient 🖤

No responses yet