Added and updated screenshots on readme

This commit is contained in:
VakarisZ 2020-04-14 13:24:39 +03:00
parent 9aaa84ee48
commit 37308897ff
5 changed files with 23 additions and 4 deletions

BIN
.github/attack-report.png vendored Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 198 KiB

BIN
.github/map-full.png vendored

Binary file not shown.

Before

Width:  |  Height:  |  Size: 80 KiB

After

Width:  |  Height:  |  Size: 162 KiB

BIN
.github/security-report.png vendored Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 122 KiB

BIN
.github/zero-trust-report.png vendored Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 194 KiB

View File

@ -13,10 +13,6 @@ Welcome to the Infection Monkey!
The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.
<img src=".github/map-full.png" >
<img src=".github/Security-overview.png" width="800" height="500">
The Infection Monkey is comprised of two parts:
* **Monkey** - A tool which infects other machines and propagates to them.
@ -24,6 +20,27 @@ The Infection Monkey is comprised of two parts:
To read more about the Monkey, visit [infectionmonkey.com](https://infectionmonkey.com).
## Screenshots
&lt;summary&gt;Map&lt;&#47;summary&gt;
&lt;br&gt;
<img src=".github/map-full.png" width="800" height="500">
&lt;&#47;details&gt;
&lt;summary&gt;Security report&lt;&#47;summary&gt;
&lt;br&gt;
<img src=".github/security-report.png" width="800" height="500">
&lt;&#47;details&gt;
&lt;summary&gt;Zero trust report&lt;&#47;summary&gt;
&lt;br&gt;
<img src=".github/zero-trust-report.png" width="800" height="500">
&lt;&#47;details&gt;
&lt;summary&gt;ATT&CK report&lt;&#47;summary&gt;
&lt;br&gt;
<img src=".github/attack-report.png" width="800" height="500">
&lt;&#47;details&gt;
## Main Features
The Infection Monkey uses the following techniques and exploits to propagate to other machines.
@ -40,6 +57,8 @@ The Infection Monkey uses the following techniques and exploits to propagate to
* Conficker
* SambaCry
* Elastic Search (CVE-2015-1427)
* Weblogic server
* and more
## Setup
Check out the [Setup](https://github.com/guardicore/monkey/wiki/setup) page in the Wiki or a quick getting [started guide](https://www.guardicore.com/infectionmonkey/wt/).