In recent years there has been a large growth in Internet traffic generated by malware, that is, Internet worms and viruses. This traffic usually only impinges on the user when either their machine gets infected or during the epidemic stage of a new worm when the Internet becomes unusable due to overloaded routers.
What is less well-known is that there is a background level of malware traffic at times of non-epidemic growth and that anyone plugging an unfirewalled machine into the Internet today will see a steady stream of port scans, back-scatter from attempted distributed denial-of-service attacks, and host scans. We need to build better firewalls, protect the Internet router infrastructure, and provide early-warning mechanisms for new attacks.
Since you are an expert ethical hacker and penetration tester, your IT director instructs you to test the network to determine whether any viruses and worms will damage or steal the organization’s information. You need to construct viruses and worms, try to inject them into a dummy network (virtual machine), and check their behaviour, whether they are detected by an antivirus and if they bypass the firewall.
The objective of this lab is to make students learn and understand how to make viruses and worms.
In this lab you have learnt how to use encrypting/decrypting commands and generating hashes and checksum files. Document all the files, created viruses, and worms in a separate location.