Go to file
maor.rayzin 2f1240cc0e * Added the boto3 pckg to the right req'.txt file
* Added a safe dict key access for aws_instance_id in report.py
* Added a skip in the aws_export if there is no instance_id in the issue.
2018-11-27 20:21:39 +02:00
.github Update issue templates 2018-05-05 18:36:42 +03:00
docker quickwin dockerization 2018-05-04 17:23:10 +02:00
monkey * Added the boto3 pckg to the right req'.txt file 2018-11-27 20:21:39 +02:00
.gitignore Update gitignore, another relative file fix 2018-05-23 16:09:35 +03:00
.travis.yml Travis CI: Add Python 3.7 to the testing 2018-09-08 15:42:10 +02:00
CONTRIBUTING.md Update where we want PRs to go to 2018-05-04 18:44:21 +03:00
LICENSE Changed name to fit Github standard 2016-03-01 17:54:01 +02:00
README.md Remove year in the license 2018-05-01 15:12:30 +03:00

README.md

Infection Monkey

Data center Security Testing Tool


Welcome to the Infection Monkey!

The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.

The Infection Monkey is comprised of two parts:

  • Monkey - A tool which infects other machines and propagates to them
  • Monkey Island - A dedicated server to control and visualize the Infection Monkey's progress inside the data center

To read more about the Monkey, visit http://infectionmonkey.com

Main Features

The Infection Monkey uses the following techniques and exploits to propagate to other machines.

  • Multiple propagation techniques:
    • Predefined passwords
    • Common logical exploits
    • Password stealing using Mimikatz
  • Multiple exploit methods:
    • SSH
    • SMB
    • RDP
    • WMI
    • Shellshock
    • Conficker
    • SambaCry
    • Elastic Search (CVE-2015-1427)

Setup

Check out the Setup page in the Wiki or a quick getting started guide.

Building the Monkey from source

If you want to build the monkey from source, see Setup and follow the instructions at the readme files under infection_monkey and monkey_island.

License

Copyright (c) Guardicore Ltd

See the LICENSE file for license rights and limitations (GPLv3).