forked from p15670423/monkey
Changed draft=true to false and used chilrden shortcode instead of manually listing subpages
This commit is contained in:
parent
76786612b5
commit
ee6f89100c
|
@ -8,7 +8,7 @@ pre = "<i class='fas fa-map-marked-alt'></i> "
|
|||
|
||||
# Use cases
|
||||
|
||||
This section describes possible use cases for the "Infection Monkey" and helps to
|
||||
This section describes possible use cases for the Infection Monkey and helps to
|
||||
understand how this tool can be configured.
|
||||
You can also refer to [our FAQ](../../faq) for more specific questions and answers.
|
||||
|
||||
|
@ -16,9 +16,6 @@ You can also refer to [our FAQ](../../faq) for more specific questions and answe
|
|||
No worries! The Monkey uses safe exploiters and does not cause any permanent system modifications that impact security or operations.
|
||||
{{% /notice %}}
|
||||
|
||||
#### Section contents:
|
||||
- [Network breach](./network-breach) - Simulate internal network breach.
|
||||
- [Network segmentation](./network-segmentation) - Test network segmentation.
|
||||
- [Credential leak](./credential-leak) - Assess the impact of successful phishing attack or other form of credential leak.
|
||||
- [IDS/IPS Test](./ids-test) - Test your network defence solutions.
|
||||
- [Other](./other) - Tips and tricks about configuring monkey for your needs.
|
||||
## Section contents
|
||||
|
||||
{{% children description=True %}}
|
||||
|
|
|
@ -1,7 +1,8 @@
|
|||
---
|
||||
title: "Credential Leak"
|
||||
date: 2020-08-12T13:04:25+03:00
|
||||
draft: true
|
||||
draft: false
|
||||
description: "Assess the impact of successful phishing attack, insider threat, or other form of credentials leak."
|
||||
weight: 4
|
||||
---
|
||||
|
||||
|
|
|
@ -1,7 +1,8 @@
|
|||
---
|
||||
title: "IDS/IPS Test"
|
||||
date: 2020-08-12T13:07:47+03:00
|
||||
draft: true
|
||||
draft: false
|
||||
description: "Test your network defence solutions."
|
||||
weight: 5
|
||||
---
|
||||
|
||||
|
|
|
@ -1,7 +1,8 @@
|
|||
---
|
||||
title: "Network Breach"
|
||||
date: 2020-08-12T13:04:55+03:00
|
||||
draft: true
|
||||
draft: false
|
||||
description: "Simulate an internal network breach and assess the potential impact."
|
||||
weight: 1
|
||||
---
|
||||
|
||||
|
|
|
@ -1,7 +1,8 @@
|
|||
---
|
||||
title: "Network Segmentation"
|
||||
date: 2020-08-12T13:05:05+03:00
|
||||
draft: true
|
||||
draft: false
|
||||
description: "Test network segmentation policies for apps that need ringfencing or tiers that require microsegmentation."
|
||||
weight: 3
|
||||
---
|
||||
|
||||
|
|
|
@ -1,7 +1,8 @@
|
|||
---
|
||||
title: "Other"
|
||||
date: 2020-08-12T13:07:55+03:00
|
||||
draft: true
|
||||
draft: false
|
||||
description: "Tips and tricks about configuring monkey for your needs."
|
||||
weight: 100
|
||||
---
|
||||
|
||||
|
|
Loading…
Reference in New Issue