Docs: Wrap lines in monkey propagation section of FAQ
This commit is contained in:
parent
cd937802d7
commit
c16cff7b32
|
@ -227,40 +227,53 @@ This is sometimes caused when Monkey Island is installed with an old version of
|
|||
|
||||
## Can I limit how the Infection Monkey propagates through my network?
|
||||
|
||||
In order to limit how the Infection Monkey is able to propagate through your network, you can:
|
||||
In order to limit how the Infection Monkey is able to propagate through your
|
||||
network, you can:
|
||||
|
||||
#### Adjust the scan depth
|
||||
|
||||
The scan depth limits the number of hops that the Infection Monkey agent will spread from patient zero. If
|
||||
the scan depth is set to 1, the agent will spread only 1 hop from patient zero. Scan depth does not limit the number of
|
||||
devices, just the number of hops.
|
||||
The scan depth limits the number of hops that the Infection Monkey agent will
|
||||
spread from patient zero. If the scan depth is set to 1, the agent will spread
|
||||
only 1 hop from patient zero. Scan depth does not limit the number of devices,
|
||||
just the number of hops.
|
||||
|
||||
- **Example**: Scan depth is set to 2. _Host A_ scans the network and finds hosts _B, C, D_ and _E_.
|
||||
The Infection Monkey agent successfully propagates from _Host A_ to _Host C_. Since the scan depth is 2, the agent will pivot
|
||||
from _Host C_ and continue to scan other machines on the network. If _Host C_ successfully breaches
|
||||
_Host E_, it will not pivot further and it will not continue to scan or propagate.
|
||||
- **Example**: Scan depth is set to 2. _Host A_ scans the network and finds
|
||||
hosts _B, C, D_ and _E_. The Infection Monkey agent successfully propagates
|
||||
from _Host A_ to _Host C_. Since the scan depth is 2, the agent will pivot from
|
||||
_Host C_ and continue to scan other machines on the network. If _Host C_
|
||||
successfully breaches _Host E_, it will not pivot further and it will not
|
||||
continue to scan or propagate.
|
||||
|
||||
![What is scan depth](/images/faq/propagation_depth_diagram.png "What is scan depth")
|
||||
![What is scan depth](/images/faq/propagation_depth_diagram.png "What is scan
|
||||
depth")
|
||||
|
||||
|
||||
#### Enable/disable scanning the local subnet
|
||||
Settings that define how the Infection Monkey will scan the network can be found in `Configuration -> Network`. By default each agent will scan its entire local subnet.
|
||||
This behavior can be disabled by unchecking the `Local network scan` button.
|
||||
Settings that define how the Infection Monkey will scan the network can be
|
||||
found in `Configuration -> Network`. By default each agent will scan its entire
|
||||
local subnet. This behavior can be disabled by unchecking the `Local network
|
||||
scan` button.
|
||||
|
||||
#### Add IPs to the IP allow list
|
||||
|
||||
The Infection Monkey agents attempt to scan any hosts that are specified in the `Configuration -> Network -> Scan target list` section.
|
||||
The Infection Monkey agents attempt to scan any hosts that are specified in the
|
||||
`Configuration -> Network -> Scan target list` section.
|
||||
|
||||
#### Add IPs to the IP block list
|
||||
|
||||
If there are any hosts on your network that you would like to prevent the Infection Monkey from scanning or exploiting, they can be added to list of "Blocked IPs" in `Configuration -> Network -> Blocked IPs`.
|
||||
If there are any hosts on your network that you would like to prevent the
|
||||
Infection Monkey from scanning or exploiting, they can be added to list of
|
||||
"Blocked IPs" in `Configuration -> Network -> Blocked IPs`.
|
||||
|
||||
#### Specify max number of victims to find/exploit
|
||||
|
||||
Two settings in `Configuration -> Internal -> Monkey` allow you to further limit the Infection Monkey's propagation:
|
||||
Two settings in `Configuration -> Internal -> Monkey` allow you to further
|
||||
limit the Infection Monkey's propagation:
|
||||
|
||||
- **Max victims to find**: This limits the total number of machines that the Infection Monkey is allowed to scan.
|
||||
- **Max victims to exploit**: This limits the number of machines that the Infection Monkey is allowed to successfully exploit.
|
||||
- **Max victims to find**: This limits the total number of machines that the
|
||||
Infection Monkey is allowed to scan.
|
||||
- **Max victims to exploit**: This limits the number of machines that the
|
||||
Infection Monkey is allowed to successfully exploit.
|
||||
|
||||
|
||||
## How can I get involved with the project?
|
||||
|
|
Loading…
Reference in New Issue