Go to file
maor.rayzin 19d324d81f Merge branch 'develop' into feature/mssql_exploiter
# Conflicts:
#	infection_monkey/config.py
#	infection_monkey/example.conf
#	infection_monkey/exploit/__init__.py
2018-06-27 21:40:05 +03:00
.github Update issue templates 2018-05-05 18:36:42 +03:00
common from six import string_types, text_type, xrange (#128) 2018-05-22 11:13:18 +03:00
docker quickwin dockerization 2018-05-04 17:23:10 +02:00
infection_monkey Merge branch 'develop' into feature/mssql_exploiter 2018-06-27 21:40:05 +03:00
monkey_island Merge branch 'develop' into feature/mssql_exploiter 2018-06-27 21:40:05 +03:00
.gitignore git ignore node_modules 2017-09-12 13:47:28 +03:00
.travis.yml Travis CI for automated testing of all pull requests 2018-05-07 17:19:28 +02:00
CONTRIBUTING.md Update where we want PRs to go to 2018-05-04 18:44:21 +03:00
LICENSE Changed name to fit Github standard 2016-03-01 17:54:01 +02:00
README.md Remove year in the license 2018-05-01 15:12:30 +03:00

README.md

Infection Monkey

Data center Security Testing Tool


Welcome to the Infection Monkey!

The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.

The Infection Monkey is comprised of two parts:

  • Monkey - A tool which infects other machines and propagates to them
  • Monkey Island - A dedicated server to control and visualize the Infection Monkey's progress inside the data center

To read more about the Monkey, visit http://infectionmonkey.com

Main Features

The Infection Monkey uses the following techniques and exploits to propagate to other machines.

  • Multiple propagation techniques:
    • Predefined passwords
    • Common logical exploits
    • Password stealing using Mimikatz
  • Multiple exploit methods:
    • SSH
    • SMB
    • RDP
    • WMI
    • Shellshock
    • Conficker
    • SambaCry
    • Elastic Search (CVE-2015-1427)

Setup

Check out the Setup page in the Wiki or a quick getting started guide.

Building the Monkey from source

If you want to build the monkey from source, see Setup and follow the instructions at the readme files under infection_monkey and monkey_island.

License

Copyright (c) Guardicore Ltd

See the LICENSE file for license rights and limitations (GPLv3).