--- title: "Security report" date: 2020-06-24T21:16:10+03:00 draft: false --- {{% notice info %}} Check out [the documentation for the other reports as well](../). {{% /notice %}} The Monkey's Security Report is built to provide you with actionable recommendations and insight to the Attacker's view of your network. You can download a PDF of this example report: {{%attachments title="Download the PDF" pattern=".*(pdf)"/%}} The report is split into 3 main categories: "Overview", "Recommendations" and "The network from the Monkey's eyes". - [Overview](#overview) - [High level information](#high-level-information) - [Used Credentials](#used-credentials) - [Exploits and targets](#exploits-and-targets) - [Security Findings](#security-findings) - [Recommendations](#recommendations) - [Machine related recommendations relating to specific CVEs](#machine-related-recommendations-relating-to-specific-cves) - [Machine related recommendations relating to network security and segmentation](#machine-related-recommendations-relating-to-network-security-and-segmentation) - [The network from the Monkey's eyes](#the-network-from-the-monkeys-eyes) - [Network infection map](#network-infection-map) - [Scanned servers](#scanned-servers) - [Exploits and post-breach actions](#exploits-and-post-breach-actions) - [Stolen Credentials](#stolen-credentials) ## Overview The overview section of the report provides high-level information about the Monkey execution and the main security findings that the Monkey has found. ### High level information The report starts with information about the execution, including how long the simulation took and from which machine the infection started from.  ### Used Credentials The report will show which credentials were used for brute-forcing.  ### Exploits and targets The report shows which exploits were attempted in this simulation and which targets the Monkey scanned and tried to exploit.  ### Security Findings The report highlights the most important security threats and issues the Monkey discovered during the attack.  ## Recommendations This section contains the Monkey's recommendations for improving your security - what mitigations you need to implement. ### Machine related recommendations relating to specific CVEs  ### Machine related recommendations relating to network security and segmentation  ## The network from the Monkey's eyes This section contains the Infection Map and some summary tables on servers the Monkey has found. ### Network infection map This part shows the network map and a breakdown of how many machines were breached.  ### Scanned servers This part shows the attack surface the Monkey has found.  ### Exploits and post-breach actions This part shows which exploits and Post Breach Actions the Monkey has performed in this simulation.  ### Stolen Credentials This part shows which credentials the Monkey was able to steal from breached machines in this simulation. 