This repo includes three versions of a basic worm that will propagate through SSH and carry out one of three attacks (replication, file encryption, password theft) FOR ACADEMIC PURPOSES ONLY
Assignment 1 Fall 2016 --- CPSC 456 --- Professor Gofman --- Due 21 October 2016
Team Members: Micah Geertson - [email protected] Joshua Womack - [email protected]
Virtual Machines: Attacker - VM3 (192.168.1.6) Victims - VM1 (192.168.1.4) and VM2 (192.168.1.7) Credentials - Username: ubuntu Password: 123456
How To Execute:
replicator_worm.py - From attacker machine (VM3), enter python /tmp/replicator_worm.py in the command line, or double click the link on the Desktop.
passwordthief_worm.py - From attacker machine (VM3), enter python /tmp/passwordthief_worm.py in the command line, or double click the link on the Desktop.
extorter_worm.py - From attacker machine (VM3), enter python /tmp/extorter_worm.py in the command line, or double click the link on the Desktop.
Special Notes: Man, itβs worm in here. All worms and the infected marker reside in the /tmp/ folder under their respective names. This is where the worm propagates from. There are also copies in the ~/Desktop/Worms/ folder in case the /tmp/ folder gets cleaned out by the system.