monkey/docs/content/usage/how-to-configure-the-monkey.md

23 lines
913 B
Markdown
Raw Normal View History

---
title: "How to Configure the Monkey"
date: 2020-06-07T19:08:51+03:00
draft: false
weight: 3
---
The Monkey is very configurable, nearly every part of it can be modified to turn it to a fast acting worm or into a port scanning and system information collecting machine.
The configuration is split into two parts, **Basic** and everything else. The **Basic** options are pretty self explanatory and are split into two sections:
## Credentials
In this screen you can feed the Monkey with “stolen” credentials for your network, simulating an attacker with inside knowledge.
## Network
Here you can control multiple important settings, such as:
* Network propagation depth - How many hops from the base machine will the Monkey spread
* Local network scan - Should the Monkey attempt to attack any machine in its subnet
* Scanner IP/subnet list - Specific IP ranges that the Monkey should try to attack.