Here you can control multiple important settings, such as:
- Network propagation depth - How many hops from the base machine will the Infection Monkey spread?
- Local network scan - Should the Infection Monkey attempt to attack any machine in its subnet?
- Scanner IP/subnet list - Which specific IP ranges should the Infection Monkey should try to attack?
Updated 3 months ago