How do I build my own computer worm for penetration testing?

Learn computer worm malware inside and out by building your own.

By Chad Russell
April 27, 2017
Earthworm Earthworm (source: Natfot via Pixabay)

Defense against malware requires a deep understanding of how it functions internally. In this video, Chad Russell constructs a simple computer worm with characteristics similar to those commonly found in computer malware. Ethical hackers with a basic knowledge of the Windows operating system will gain a better understanding of the inner workings of malware worms and how they prey on vulnerabilities.

Take your ethical hacking skills to the next level with the full Certified Ethical Hacker course on Safari.

Learn faster. Dig deeper. See farther.

Join the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful.

Learn more


Chad Russell is a cyber security veteran of 15 years who has held CISSP, CCNP, MCSE, and MCDBA certifications. Chad has taught Microsoft Engineering courses as a certified trainer, and has acted as a security engineering consultant for companies such as SAP, Microsoft, and Oracle. Currently, Chad conducts security risk assessments for companies throughout North America with an emphasis on cloud security, identity governances, network security, social engineering, mobile security, breach assessments, database security, and access management.

Post topics: Security
Post tags: Questions
Share: