The Internet Worm

Please use the reference material indicated to answer the four questions below. Email me your answers to these questions before midnight on Wednesday, April 25th.

  1. What security vulnerabilities did the internet worm exploit?
    [Worm Slides, page 4.]

  2. List one technique that the worm used to avoid easy detection.
    [Tour of the Worm, "Overview".]

  3. Which type of hosts (internet hosts) were the worm's favorite to attack?
    [Tour of the Worm, sec. 4.4. "Locating New Hosts to Infect".]

  4. How many states does the worms password cracking algorithm have?
    [Tour of the Worm, sec. 4.7.1, "Guessing Passwords".]