102 lines
4.4 KiB
Markdown
102 lines
4.4 KiB
Markdown
# Infection Monkey
|
|
[![GitHub release (latest by date)](https://img.shields.io/github/v/release/guardicore/monkey)](https://github.com/guardicore/monkey/releases)
|
|
|
|
[![Build Status](https://travis-ci.com/guardicore/monkey.svg?branch=develop)](https://travis-ci.com/guardicore/monkey)
|
|
[![codecov](https://codecov.io/gh/guardicore/monkey/branch/develop/graph/badge.svg)](https://codecov.io/gh/guardicore/monkey)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/guardicore/monkey)
|
|
![GitHub commit activity](https://img.shields.io/github/commit-activity/m/guardicore/monkey)
|
|
|
|
## Data center Security Testing Tool
|
|
|
|
Welcome to the Infection Monkey!
|
|
|
|
The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.
|
|
|
|
The Infection Monkey is comprised of two parts:
|
|
|
|
* **Monkey** - A tool which infects other machines and propagates to them.
|
|
* **Monkey Island** - A dedicated server to control and visualize the Infection Monkey's progress inside the data center.
|
|
|
|
To read more about the Monkey, visit [infectionmonkey.com](https://infectionmonkey.com).
|
|
|
|
## 💥 We're Hiring 💥
|
|
We are looking for a strong, full-stack developer with a passion for
|
|
cybersecurity to join the Infection Monkey development team. Infection Monkey
|
|
is an open-source, automated, breach and attack simulation platform, consisting
|
|
of a worm-like agent and C&C server. This is a remote position and is open
|
|
world-wide. If you're excited about Infection Monkey, we want to see your
|
|
resume. You can learn more about Infection Monkey on our
|
|
[website](https://www.guardicore.com/infectionmonkey/).
|
|
|
|
For more information, or to apply, see the official job post
|
|
[here](https://www.guardicore.com/careers/co/labs/65.D16/full-stack-developer/all/?coref=1.10.r36_60E&t=1617025683094).
|
|
|
|
## Screenshots
|
|
|
|
### Map
|
|
<img src=".github/map-full.png" width="800" height="600">
|
|
|
|
### Security report
|
|
<img src=".github/security-report.png" width="800" height="500">
|
|
|
|
### Zero trust report
|
|
<img src=".github/zero-trust-report.png" width="800" height="500">
|
|
|
|
### ATT&CK report
|
|
<img src=".github/attack-report.png" width="900" height="500">
|
|
|
|
## Main Features
|
|
|
|
The Infection Monkey uses the following techniques and exploits to propagate to other machines.
|
|
|
|
* Multiple propagation techniques:
|
|
* Predefined passwords
|
|
* Common logical exploits
|
|
* Password stealing using Mimikatz
|
|
* Multiple exploit methods:
|
|
* SSH
|
|
* SMB
|
|
* WMI
|
|
* Shellshock
|
|
* Conficker
|
|
* SambaCry
|
|
* Elastic Search (CVE-2015-1427)
|
|
* Weblogic server
|
|
* and more, see our [Documentation hub](https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/) for more information about our RCE exploiters.
|
|
|
|
## Setup
|
|
Check out the [Setup](https://www.guardicore.com/infectionmonkey/docs/setup/) page in the Wiki or a quick getting [started guide](https://www.guardicore.com/infectionmonkey/docs/usage/getting-started/).
|
|
|
|
The Infection Monkey supports a variety of platforms, documented [in our documentation hub](https://www.guardicore.com/infectionmonkey/docs/reference/operating_systems_support/).
|
|
|
|
## Building the Monkey from source
|
|
To deploy development version of monkey you should refer to readme in the [deployment scripts](deployment_scripts)
|
|
folder or follow documentation in [documentation hub](https://www.guardicore.com/infectionmonkey/docs/development/setup-development-environment/).
|
|
|
|
### Build status
|
|
| Branch | Status |
|
|
| ------ | :----: |
|
|
| Develop | [![Build Status](https://travis-ci.com/guardicore/monkey.svg?branch=develop)](https://travis-ci.com/guardicore/monkey) |
|
|
| Master | [![Build Status](https://travis-ci.com/guardicore/monkey.svg?branch=master)](https://travis-ci.com/guardicore/monkey) |
|
|
|
|
## Tests
|
|
|
|
### Unit Tests
|
|
|
|
In order to run all of the Unit Tests, run the command `python -m pytest` in the `monkey` directory.
|
|
|
|
To get a coverage report, first make sure the `coverage` package is installed using `pip install coverage`. Run the command
|
|
`coverage run -m unittest` in the `monkey` directory and then `coverage html`. The coverage report can be found in
|
|
`htmlcov.index`.
|
|
|
|
### Blackbox tests
|
|
|
|
In order to run the Blackbox tests, refer to `envs/monkey_zoo/blackbox/README.md`.
|
|
|
|
# License
|
|
|
|
Copyright (c) Guardicore Ltd
|
|
|
|
See the [LICENSE](LICENSE) file for license rights and limitations (GPLv3).
|