Jump to Content
Guide
Guide
Guide
Welcome
Guardicore Infection Monkey documentation hub
Setup
Setting up Infection Monkey
Windows
Docker
Linux
AWS
Azure
Accounts and security
Usage
Usage
Getting started
Scenarios
Ransomware simulation
Custom
Network breach
Network segmentation
Credentials leak
Other
Configuration
Credentials
Importing and exporting configurations
Network
Integrations
Running the Agent on AWS EC2 instances
Verify integrity- checksums
Running manually
Malware Masquerade
Polymorphism
Cryptojacker simulation
Plugins
Reference
Logs
Reference
Data directory
Operating Systems
Exploiters
Log4Shell
PowerShell
Zerologon
WMIexec
SSHexec
SMBexec
MSSQL
Hadoop
RDP
Server configuration
Credential collectors
System requirements
Tutorials
Hello Monkey
Ransomware
First steps
how-tos
Factory reset
Download logs
Contribute
Securing networks together
Development setup
Reports
Infection Monkey reports
Security report
Ransomware report
FAQs
Frequently asked questions
Suggest
Akamai.com
Linode.com
Contact us
Akamai support
Linode support
Share feedback
Try Akamai
Log in
Log out
Try Akamai
Akamai.com
Linode.com
Contact us
Akamai support
Linode support
Share feedback
Log in
Log out