2020-06-08 02:44:19 +08:00
---
title: "Infection Monkey Documentation Hub"
date: 2020-05-26T18:15:37+03:00
draft: false
---
2020-06-28 21:52:38 +08:00
# Infection Monkey documentation hub
{{< homepage_shortcuts > }}
2020-06-08 02:44:19 +08:00
2020-06-30 01:02:41 +08:00
## What is Guardicore Infection Monkey?
2020-06-09 03:26:35 +08:00
2021-03-24 22:29:44 +08:00
The Infection Monkey is an open-source breach and attack simulation tool for testing a data center's resiliency to perimeter breaches and internal server infection.
2021-03-25 15:11:13 +08:00
Infection Monkey will help you validate existing security solutions and will provide a view of the internal network from an attacker's perspective.
2021-03-24 18:48:51 +08:00
Infection Monkey is free and can be downloaded from [our homepage ](https://infectionmonkey.com/ ).
2020-06-09 03:26:35 +08:00
2020-06-29 23:51:53 +08:00
![Infection Monkey Documentation Hub Logo ](/images/monkey-teacher.svg?height=400px "Infection Monkey Documentation Hub Logo" )
2021-03-24 18:48:51 +08:00
## How it works
2021-03-25 15:11:13 +08:00
Architecturally, Infection Monkey is comprised of two components:
2021-03-24 18:48:51 +08:00
2021-03-24 22:29:44 +08:00
* Monkey Agent (Monkey for short) - a safe, worm-like binary program which scans, propagates and simulates attack techniques on the **local network** .
* Monkey Island Server (Island for short) - a C& C web server which provides a GUI for users and interacts with the Monkey Agents.
2021-03-24 18:48:51 +08:00
2021-03-25 15:11:13 +08:00
The user can run the Monkey Agent on the Island server machine or distribute Monkey Agent binaries on the network manually. Based on
2021-03-25 20:33:22 +08:00
the configuration parameters, Monkey Agents scan, propagate and simulate an attacker's behavior on the local network. All of the
2021-03-24 18:48:51 +08:00
information gathered about the network is aggregated in the Island Server and displayed once all Monkey Agents are finished.
2020-06-09 03:26:35 +08:00
2021-03-24 18:48:51 +08:00
## Results
2020-06-09 03:26:35 +08:00
2021-03-24 22:29:44 +08:00
The results of running Monkey Agents are:
- A map which displays how much of the network an attacker can see, what services are accessible and potential propagation routes.
- A security report, which displays security issues that Monkey Agents discovered and/or exploited.
2021-03-25 15:11:13 +08:00
- A MITRE ATT& CK report, which displays the information about the ATT& CK techniques that Monkey Agents tried to use.
2021-03-24 22:29:44 +08:00
- A Zero Trust report, which displays violations of Zero Trust principles that Monkey Agents found.
2021-03-24 18:48:51 +08:00
2021-03-24 22:29:44 +08:00
A more in-depth description of reports generated can be found in the [reports documentation page ](/reports ).
2020-06-09 03:26:35 +08:00
## Getting Started
2020-06-29 22:02:31 +08:00
If you haven't downloaded Infection Monkey yet you can do so [from our homepage ](https://www.guardicore.com/infectionmonkey/#download ). After downloading the Monkey, install it using one of our [setup guides ](setup ), and read our [getting started guide ](usage/getting-started ) for a quick-start on Monkey!
2020-06-09 03:26:35 +08:00
## Support and community
2020-06-14 20:44:07 +08:00
If you need help or want to talk all things Monkey, you can [join our public Slack workspace ](https://join.slack.com/t/infectionmonkey/shared_invite/enQtNDU5MjAxMjg1MjU1LWM0NjVmNWE2ZTMzYzAxOWJiYmMxMzU0NWU3NmUxYjcyNjk0YWY2MDkwODk4NGMyNDU4NzA4MDljOWNmZWViNDU ) or [contact us via Email ](mailto:support@infectionmonkey.com ).