Logo
latest

History

  • Introduction
    • What?
    • Why?
    • How?

Basics

  • Introduction
    • What?
    • Why?
    • How?
  • Typical behaviours
  • Purpose of a malware attack
  • Malware signatures
  • Static and dynamic analysis
    • Static
    • Dynamic
    • Resources
  • Packers
    • Identifying packers

REMnux

  • Introduction
    • What?
    • Why?
    • How?
  • Analysing malicious pdfs
    • Questions
  • Analysing malicious Microsoft Office macros
    • Questions
  • I hope you packed your bags
    • Packing/unpacking
    • Identifying packers
    • Questions

Challenges

  • Introduction
    • What?
    • Why?
    • How?
  • THM Dunkle Materie
    • Questions
Malware analysis
  • Malware analysis
  • Blue Team
  • Improbability Blog
  • About the UU
  • Register

Introduction

What?

Small stories on how malicious software (malware) has evolved into the complicated viruses we may be exposed to today.

Why?

Context setting.

How?

  • Interview with Ray Tomlinson on Creeper/Reaper

  • Malware spotlight: Wabbit

  • The Animal Episode

  • Elk-Cloner: The 30-year-old prank that became the first computer virus

  • With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988

  • YouTube: Virus.DOS.Cascade

  • onx/CASCADE

Previous Next

Unseen University, 2023, with a forest garden fostered by /ut7.
Read the Docs v: latest
Versions
latest
Downloads
On Read the Docs
Project Home
Builds