forked from p15670423/monkey
23 lines
913 B
Markdown
23 lines
913 B
Markdown
|
---
|
||
|
title: "How to Configure the Monkey"
|
||
|
date: 2020-06-07T19:08:51+03:00
|
||
|
draft: false
|
||
|
weight: 3
|
||
|
---
|
||
|
|
||
|
The Monkey is very configurable, nearly every part of it can be modified to turn it to a fast acting worm or into a port scanning and system information collecting machine.
|
||
|
|
||
|
The configuration is split into two parts, **Basic** and everything else. The **Basic** options are pretty self explanatory and are split into two sections:
|
||
|
|
||
|
## Credentials
|
||
|
|
||
|
In this screen you can feed the Monkey with “stolen” credentials for your network, simulating an attacker with inside knowledge.
|
||
|
|
||
|
## Network
|
||
|
|
||
|
Here you can control multiple important settings, such as:
|
||
|
|
||
|
* Network propagation depth - How many hops from the base machine will the Monkey spread
|
||
|
* Local network scan - Should the Monkey attempt to attack any machine in its subnet
|
||
|
* Scanner IP/subnet list - Specific IP ranges that the Monkey should try to attack.
|