monkey/docs/content/usage/use-cases/ids-test.md

2.7 KiB
Raw Blame History

title date draft description weight
IDS/IPS Test 2020-08-12T13:07:47+03:00 false Test your network defence solutions. 5

Overview

The Infection Monkey can help you verify that your security solutions are working the way you expected them to. These may include your IR and SOC teams, your SIEM, your firewall, your endpoint security solution, and more.

Configuration

  • Monkey -> Post breach simulate the actions an attacker would make on an infected system. To test something not present on the tool, you can provide your own file or command to be run.

The default configuration is good enough for many cases, but configuring testing scope and adding brute-force credentials is a good bet in any scenario.

Post breach configuration

Suggested run mode

Running the Monkey on both the Island and on a few other machines in the network manually is also recommended, as it increases coverage and propagation rates.

Assessing results

After running the Monkey, follow the Monkeys actions on the Monkey Islands infection map.

Now you can match this activity from the Monkey timeline display to your internal SIEM and make sure your security solutions are identifying and correctly alerting on different attacks.

  • The red arrows indicate successful exploitations. If you see red arrows, those incidents ought to be reported as exploitation attempts, so check whether you are receiving alerts from your security systems as expected.
  • The orange arrows indicate scanning activity, usually used by attackers to locate potential vulnerabilities. If you see orange arrows, those incidents ought to be reported as scanning attempts (and possibly as segmentation violations).
  • The blue arrows indicate tunneling activity, usually used by attackers to infiltrate “protected” networks from the Internet. Perhaps someone is trying to bypass your firewall to gain access to a protected service in your network? Check if your micro-segmentation / firewall solution identifies or reports anything.

While running this scenario, be on the lookout for the action that should arise: Did you get a phone call telling you about suspicious activity inside your network? Are events flowing into your security events aggregators? Are you getting emails from your IR teams? Is the endpoint protection software you installed on machines in the network reporting on anything? Are your compliance scanners detecting anything wrong?

Lastly, check Zero Trust and Mitre ATT&CK reports, to see which attacks can be executed on the network and how to fix it.

Map