Scenarios
Safe exploiters
The Infection Monkey uses safe exploiters and does not cause any permanent system modifications that could impact security or operations.
The Infection Monkey is a versatile breach and attack simulation tool. It allows you to configure the simulation according to your needs. You can enhance, optimize, and fine-tune the Monkey's behavior.
Section contents
Here are some examples with instructions on how to configure them:
Ransomware Simulation: Simulate a ransomware attack on your network and assess the potential damage.
Custom: Configure a custom scenario to test your network's defenses.
Updated about 1 year ago