From the course: Ethical Hacking: The Complete Malware Analysis Process
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
The evolution of malware
From the course: Ethical Hacking: The Complete Malware Analysis Process
The evolution of malware
- [Instructor] Robert Morris was one of the earliest hackers to be convicted because of malware he developed. In 1988 he released the Christmas Tree worm onto the Internet. Within a day 2,000 systems were infected and in total it caused over 6,000 computers to crash. Morris was charged and fined $10,000, rather a lot in those days. Morris had released the malware as a prank, and as a demonstration of his skills at extreme programming. The worm infected DEC and Sun Systems and introduced some early malware coding techniques. It contained what was known as a portable C grappling hook, which was used to download the main payload and also to move across to other operating systems. It didn't take long for the emergence of malicious hackers, often youngsters with too much time on their hands who created malware which was deliberately intended to cause disruption and damage systems. By the late 1990s malware was being released onto the Internet regularly, fueled by connected systems such as…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Types of malware3m 36s
-
The evolution of malware3m 40s
-
How malware is delivered2m 35s
-
How malware works3m 15s
-
How malware achieves persistence5m
-
Digging into rootkits4m 20s
-
Automating malware with botnets3m 57s
-
Virus construction kits5m 54s
-
Contemporary malware construction2m 47s
-
The MITRE ATT&CK repository2m
-
-
-
-
-