Jump to Content
Guardicore Infection Monkey
Guide
Guardicore Infection Monkey
Guide
Guide

Welcome

  • Guardicore Infection Monkey documentation hub

Setup

  • Setting up Infection Monkey
  • Windows
  • Docker
  • Linux
  • AWS
  • Azure
  • Accounts and security

Usage

  • Usage
  • Getting started
  • Scenarios
  • Ransomware simulation
  • Custom
    • Network breach
    • Network segmentation
    • Credentials leak
    • Other
  • Configuration
    • Credentials
    • Importing and exporting configurations
    • Network
  • Integrations
    • Running the Agent on AWS EC2 instances
  • Verify integrity- checksums
  • Running manually
  • Malware Masquerade
  • Polymorphism
  • Cryptojacker simulation
  • Plugins

Reference

  • Logs
  • Reference
  • Data directory
  • Operating Systems
  • Exploiters
    • Log4Shell
    • PowerShell
    • Zerologon
    • WMIexec
    • SSHexec
    • SMBexec
    • MSSQL
    • Hadoop
    • RDP
  • Server configuration
  • Credential collectors
  • System requirements

Tutorials

  • Hello Monkey
  • Ransomware
  • First steps

how-tos

  • Factory reset
  • Download logs

Contribute

  • Securing networks together
  • Development setup

Reports

  • Infection Monkey reports
  • Security report
  • Ransomware report

FAQs

  • Frequently asked questions

MSSQL

Suggest Edits

Description

For this exploit, the Infection Monkey will try to brute force into an MSSQL server and use an insecure configuration to execute commands on the server.

Updated about 2 years ago


  • Table of Contents
    • Description
Akamai TechDocs
Akamai.com
Linode.com
Contact us
Akamai support Linode support Share feedback
Try Akamai
Log in
Log out
Try Akamai

Akamai.com

Linode.com

Contact us Akamai support Linode support Share feedback

Log in
Log out