Ask about worm spreading via Virtual Machines

Status
Not open for further replies.

Maxxx58

Level 13
Thread author
Verified
Dec 20, 2014
619
1,061
1,169
Hi everyone,
Wish all of you have a nice day!
I want to ask some question about my lab at school. Please help me. Very appreciate!

My teacher ask me to spread worm via virtual machines. Firstly, I use tool to create worm. After create it, I can use email or USB to infect it to victim computer (1st virtual machine). The victim will double click on that worm and this computer will be infected.

And that worm will be spreading to another victim computer (2nd virtual machine) via network.

I attached a picture, please see it to easier understand (sorry for my bad English)
he97r88.png

I have some question wanna ask:
  1. What's tool I can use to make worm (I searched and found the tool called "Internet Worm Maker Thing", do you know another tool that makes stronger and more feature worm?)
  2. What's type of Network Adapter I can use Host-only, NAT or Bridge?. If I use Host-only, VMs can ping each others, but I don't know if worm can spread when I use Host-only mode? I just want to research this lab on VMs, not want to infect my real computer.
  3. How worm on 1st virtual machine can spread and infect 2nd virtual machine via LAN if I use virtual machines to research this lab? Do I need to disable Windows Firewall or other system security features?
I really need your help to make done this lab. Any comment will be very appreciated!
Thank you very much, all of you!
 
1) Well some are so called tiny script to act only as worms however in order to create it, you need an understanding like assembly language since it will go through network by analyzing the current network properties.

Try this one but the code is at C++ Worm Codeing

2) NAT will never be an option since its already isolated on the protocol so no chance that the worm may jump.

Possible can be Bridge connection since they can share same protocol/LAN network to another so that will depend on the worm structure how it should compare the present connection.

3) As much as possible disable any security product will make the operation work considering that the script/code made on that worm may be detectable.
 
Status
Not open for further replies.