+++ title = "Use Cases" date = 2020-08-12T12:52:59+03:00 weight = 3 chapter = true pre = " " +++ # Use cases This section describes possible use cases for the "Infection Monkey" and helps to understand how this tool can be configured. You can also refer to [our FAQ](../../faq) for more specific questions and answers. {{% notice note %}} No worries! The Monkey uses safe exploiters and does not cause any permanent system modifications that impact security or operations. {{% /notice %}} #### Section contents: - [Network breach](./network-breach) - Simulate internal network breach. - [Network segmentation](./network-segmentation) - Test network segmentation. - [Credential leak](./credential-leak) - Assess the impact of successful phishing attack or other form of credential leak. - [IDS/IPS Test](./ids-test) - Test your network defence solutions. - [Other](./other) - Tips and tricks about configuring monkey for your needs.