Jump to Content
Guardicore Infection Monkey
Guide
Guardicore Infection Monkey
Guide
Guide
All
Pages
Start typing to search…

Welcome

  • Guardicore Infection Monkey documentation hub

Setup

  • Setting up Infection Monkey
  • Windows
  • Docker
  • Linux
  • AWS
  • Azure
  • Accounts and security

Usage

  • Usage
  • Getting started
  • Scenarios
  • Ransomware simulation
  • Custom
    • Network breach
    • Network segmentation
    • Credentials leak
    • Other
  • Configuration
    • Credentials
    • Importing and exporting configurations
    • Network
  • Integrations
    • Running the Agent on AWS EC2 instances
  • Verify integrity- checksums
  • Running manually
  • Malware Masquerade
  • Polymorphism
  • Cryptojacker simulation
  • Plugins

Reference

  • Logs
  • Reference
  • Data directory
  • Operating Systems
  • Exploiters
    • Log4Shell
    • PowerShell
    • Zerologon
    • WMIexec
    • SSHexec
    • SMBexec
    • MSSQL
    • Hadoop
    • RDP
  • Server configuration
  • Credential collectors
  • System requirements

Tutorials

  • Hello Monkey
  • Ransomware
  • First steps

how-tos

  • Factory reset
  • Download logs

Contribute

  • Securing networks together
  • Development setup

Reports

  • Infection Monkey reports
  • Security report
  • Ransomware report

FAQs

  • Frequently asked questions
  1. Reference
  2. Exploiters

Hadoop

Description

This exploit consists of remote code execution on Hadoop servers with YARN and default settings. The logic is based on this vulhub module.

Updated 12 days ago


MSSQL
RDP
  • Table of Contents
    • Description
Legal & privacy Cookie settings Akamai Status
Community Training Control Center Cloud Manager

© 2026 Akamai Technologies

Akamai TechDocs
Akamai.com
Linode.com
Contact us
Akamai support Linode support Share feedback
Try Akamai
Log in
Log out
Try Akamai

Akamai.com

Linode.com

Contact us Akamai support Linode support Share feedback

Log in
Log out