forked from p15670423/monkey
docs: Add more information about the safety and sufficiency of the ransomware simulation
This commit is contained in:
parent
91c3a6cb0d
commit
97bc0fd205
|
@ -16,6 +16,16 @@ If no directory is specified, no files will be encrypted.
|
||||||
|
|
||||||
<!-- add config screenshot here -->
|
<!-- add config screenshot here -->
|
||||||
|
|
||||||
|
## How are the files encrypted?
|
||||||
|
|
||||||
|
Files are "encrypted" in place with a simple bit flip. Encrypted files are renamed to have
|
||||||
|
`.m0nk3y` appended to their names.
|
||||||
|
|
||||||
|
This is a safe way to simulate encryption since it is easy to "decrypt" your files. You can simply perform a bit flip on the files again and rename them to remove the appended `.m0nk3y` extension.
|
||||||
|
|
||||||
|
This is sufficient for a ransomware simulation as your files are unusuable and are renamed with a different extension, similar to how many ransomwares act. These changes should trigger your security solutions.
|
||||||
|
|
||||||
|
|
||||||
## Which files are encrypted?
|
## Which files are encrypted?
|
||||||
|
|
||||||
All regular files with [relevant extensions](#relevant-file-extensions-for-encryption) in the
|
All regular files with [relevant extensions](#relevant-file-extensions-for-encryption) in the
|
||||||
|
@ -27,14 +37,6 @@ configured directory — only appropriate files in the top level of the tree.
|
||||||
Symlinks and shortcuts are ignored.
|
Symlinks and shortcuts are ignored.
|
||||||
|
|
||||||
|
|
||||||
## How are the files encrypted?
|
|
||||||
|
|
||||||
Files are "encrypted" in place with a simple bit flip. Encrypted files are renamed to have
|
|
||||||
`.m0nk3y` appended to their names.
|
|
||||||
|
|
||||||
To "decrypt" your files, you can simply perform a bit flip on them again.
|
|
||||||
|
|
||||||
|
|
||||||
## Relevant file extensions for encryption
|
## Relevant file extensions for encryption
|
||||||
|
|
||||||
Encryption attempts are only performed on regular files with the following extensions.
|
Encryption attempts are only performed on regular files with the following extensions.
|
||||||
|
|
Loading…
Reference in New Issue