913 B
913 B
title | date | draft | weight |
---|---|---|---|
How to Configure the Monkey | 2020-06-07T19:08:51+03:00 | false | 3 |
The Monkey is very configurable, nearly every part of it can be modified to turn it to a fast acting worm or into a port scanning and system information collecting machine.
The configuration is split into two parts, Basic and everything else. The Basic options are pretty self explanatory and are split into two sections:
Credentials
In this screen you can feed the Monkey with “stolen” credentials for your network, simulating an attacker with inside knowledge.
Network
Here you can control multiple important settings, such as:
- Network propagation depth - How many hops from the base machine will the Monkey spread
- Local network scan - Should the Monkey attempt to attack any machine in its subnet
- Scanner IP/subnet list - Specific IP ranges that the Monkey should try to attack.