Jump to Content
Guardicore Infection Monkey
Guide
Guardicore Infection Monkey
Guide
Guide

Welcome

  • Guardicore Infection Monkey documentation hub

Setup

  • Setting up Infection Monkey
  • Windows
  • Docker
  • Linux
  • AWS
  • Azure
  • Accounts and security

Usage

  • Usage
  • Getting started
  • Scenarios
  • Ransomware simulation
  • Custom
    • Network breach
    • Network segmentation
    • Credentials leak
    • Other
  • Configuration
    • Credentials
    • Importing and exporting configurations
    • Network
  • Integrations
    • Running the Agent on AWS EC2 instances
  • Verify integrity- checksums
  • Running manually
  • Malware Masquerade
  • Polymorphism
  • Cryptojacker simulation
  • Plugins

Reference

  • Logs
  • Reference
  • Data directory
  • Operating Systems
  • Exploiters
    • Log4Shell
    • PowerShell
    • Zerologon
    • WMIexec
    • SSHexec
    • SMBexec
    • MSSQL
    • Hadoop
    • RDP
  • Server configuration
  • Credential collectors
  • System requirements

Tutorials

  • Hello Monkey
  • Ransomware
  • First steps

how-tos

  • Factory reset
  • Download logs

Contribute

  • Securing networks together
  • Development setup

Reports

  • Infection Monkey reports
  • Security report
  • Ransomware report

FAQs

  • Frequently asked questions

Exploiters

Suggest Edits

The Infection Monkey uses various remote code execution (RCE) exploiters. To our best knowledge, most of these pose no risk to performance or services on victim machines. This documentation serves as a quick introduction to the exploiters currently implemented and the vulnerabilities they use:

  • Log4Shell
  • PowerShell
  • Zerologon
  • WMIexec
  • SSHexec
  • SMBexec
  • MsSQL
  • Hadoop

Updated about 2 years ago


Akamai TechDocs
Akamai.com
Linode.com
Contact us
Akamai support Linode support Share feedback
Try Akamai
Log in
Log out
Try Akamai

Akamai.com

Linode.com

Contact us Akamai support Linode support Share feedback

Log in
Log out