2020-08-13 21:34:35 +08:00
|
|
|
+++
|
|
|
|
title = "Use Cases"
|
|
|
|
date = 2020-08-12T12:52:59+03:00
|
|
|
|
weight = 3
|
|
|
|
chapter = true
|
|
|
|
pre = "<i class='fas fa-map-marked-alt'></i> "
|
|
|
|
+++
|
|
|
|
|
|
|
|
# Use cases
|
|
|
|
|
|
|
|
This section describes possible use cases for the "Infection Monkey" and helps to
|
|
|
|
understand how this tool can be configured.
|
|
|
|
You can also refer to [our FAQ](../../faq) for more specific questions and answers.
|
|
|
|
|
|
|
|
{{% notice note %}}
|
2020-08-14 16:03:40 +08:00
|
|
|
No worries! The Monkey uses safe exploiters and does not cause any permanent system modifications that impact security or operations.
|
2020-08-13 21:34:35 +08:00
|
|
|
{{% /notice %}}
|
|
|
|
|
2020-08-14 16:03:40 +08:00
|
|
|
#### Section contents:
|
|
|
|
- [Network breach](./network-breach) - Simulate internal network breach.
|
|
|
|
- [Network segmentation](./network-segmentation) - Test network segmentation.
|
|
|
|
- [Credential leak](./credential-leak) - Assess the impact of successful phishing attack or other form of credential leak.
|
|
|
|
- [IDS/IPS Test](./ids-test) - Test your network defence solutions.
|
|
|
|
- [Other](./other) - Tips and tricks about configuring monkey for your needs.
|