Configuration
The Infection Monkey is highly configurable. Nearly every part of it can be modified to turn it into a fast-acting worm or a port scanning and system information collecting machine.
Incomplete documentation
This section of the documentation is incomplete and under active construction.
See these documentation pages for information on each configuration value:
Credentials: Configure credentials that the Monkey will use for propagation.
Network: Configure settings related to the Monkey's network activity.
Updated about 2 years ago