The Internet Worm
Please use the reference material indicated to answer the four questions
below. Email me your answers to these questions before midnight on Wednesday,
April 25th.
- What security vulnerabilities did the internet worm exploit?
[Worm Slides,
page 4.]
- List one technique that the worm used to avoid easy detection.
[Tour of the
Worm, "Overview".]
- Which type of hosts (internet hosts) were the worm's favorite to attack?
[Tour of the
Worm, sec. 4.4. "Locating New Hosts to Infect".]
- How many states does the worms password cracking algorithm have?
[Tour of the
Worm, sec. 4.7.1, "Guessing Passwords".] |