Added and updated screenshots on readme
This commit is contained in:
parent
9aaa84ee48
commit
37308897ff
Binary file not shown.
After Width: | Height: | Size: 198 KiB |
Binary file not shown.
Before Width: | Height: | Size: 80 KiB After Width: | Height: | Size: 162 KiB |
Binary file not shown.
After Width: | Height: | Size: 122 KiB |
Binary file not shown.
After Width: | Height: | Size: 194 KiB |
27
README.md
27
README.md
|
@ -13,10 +13,6 @@ Welcome to the Infection Monkey!
|
||||||
|
|
||||||
The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.
|
The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.
|
||||||
|
|
||||||
<img src=".github/map-full.png" >
|
|
||||||
|
|
||||||
<img src=".github/Security-overview.png" width="800" height="500">
|
|
||||||
|
|
||||||
The Infection Monkey is comprised of two parts:
|
The Infection Monkey is comprised of two parts:
|
||||||
|
|
||||||
* **Monkey** - A tool which infects other machines and propagates to them.
|
* **Monkey** - A tool which infects other machines and propagates to them.
|
||||||
|
@ -24,6 +20,27 @@ The Infection Monkey is comprised of two parts:
|
||||||
|
|
||||||
To read more about the Monkey, visit [infectionmonkey.com](https://infectionmonkey.com).
|
To read more about the Monkey, visit [infectionmonkey.com](https://infectionmonkey.com).
|
||||||
|
|
||||||
|
## Screenshots
|
||||||
|
<summary>Map</summary>
|
||||||
|
<br>
|
||||||
|
<img src=".github/map-full.png" width="800" height="500">
|
||||||
|
</details>
|
||||||
|
|
||||||
|
<summary>Security report</summary>
|
||||||
|
<br>
|
||||||
|
<img src=".github/security-report.png" width="800" height="500">
|
||||||
|
</details>
|
||||||
|
|
||||||
|
<summary>Zero trust report</summary>
|
||||||
|
<br>
|
||||||
|
<img src=".github/zero-trust-report.png" width="800" height="500">
|
||||||
|
</details>
|
||||||
|
|
||||||
|
<summary>ATT&CK report</summary>
|
||||||
|
<br>
|
||||||
|
<img src=".github/attack-report.png" width="800" height="500">
|
||||||
|
</details>
|
||||||
|
|
||||||
## Main Features
|
## Main Features
|
||||||
|
|
||||||
The Infection Monkey uses the following techniques and exploits to propagate to other machines.
|
The Infection Monkey uses the following techniques and exploits to propagate to other machines.
|
||||||
|
@ -40,6 +57,8 @@ The Infection Monkey uses the following techniques and exploits to propagate to
|
||||||
* Conficker
|
* Conficker
|
||||||
* SambaCry
|
* SambaCry
|
||||||
* Elastic Search (CVE-2015-1427)
|
* Elastic Search (CVE-2015-1427)
|
||||||
|
* Weblogic server
|
||||||
|
* and more
|
||||||
|
|
||||||
## Setup
|
## Setup
|
||||||
Check out the [Setup](https://github.com/guardicore/monkey/wiki/setup) page in the Wiki or a quick getting [started guide](https://www.guardicore.com/infectionmonkey/wt/).
|
Check out the [Setup](https://github.com/guardicore/monkey/wiki/setup) page in the Wiki or a quick getting [started guide](https://www.guardicore.com/infectionmonkey/wt/).
|
||||||
|
|
Loading…
Reference in New Issue