Getting started

If you haven't deployed the Monkey Island yet, please refer to our setup documentation.

Using the Infection Monkey

After deploying the Monkey Island in your environment, navigate to https://<server-ip>:5000.

First-time login

On your first login, you'll be asked to create a username and password for the Monkey Island Server. See this page for more details.

Installing plugins

Infection Monkey's various features are provided by plugins. No plugins are installed out of the box. To install plugins, click on Plugins in the navigation bar and install the plugins you want to use. Clicking on "Download All Safe Plugins" will download all plugins that are considered safe to use in production environments.

Running the Infection Monkey

To get the Infection Monkey running as fast as possible, click Run Monkey. Optionally, you can configure the Infection Monkey before you continue by clicking Configuration (see how to configure the Infection Monkey).

To run the Infection Monkey, select one of the following options:

  1. Click From Island to run the Infection Monkey on the Monkey Island Server. This simulates an attacker trying to propagate through your local network from the Monkey Island machine.
  2. Click Manual to download and execute the Infection Monkey on a machine of your choice.
    Follow the instructions and run the generated command on the machine you selected. This simulates an attacker who has breached one of your servers. The Infection Monkey will map all accessible machines and their open services, attempt to steal credentials, and use exploits to propagate.

📘

Running the Monkey in an AWS Cloud environment

If you're running the Infection Monkey in an AWS cloud environment, check out Usage -> Integrations for information about how it integrates with AWS.

Infection map

Next, click Infection Map to see the Infection Monkey in action.

As the simulation progresses, the map is updated with data on accessible and "hacked" machines. Once all Infection Monkey Agents have finished propagating, click Security Report to see the reports. See Infection Monkey's Reports for more info.

Congratulations, you finished your first successful execution of the Infection Monkey 🎉 To thoroughly test your network, you can run the Infection Monkey from different starting locations and use different configurations.