Docs: Add a section for custom file extension

This commit is contained in:
Kekoa Kaaikala 2022-08-18 16:47:57 +00:00
parent 9cbee5ba6d
commit baa1687487
2 changed files with 10 additions and 4 deletions

View File

@ -37,15 +37,21 @@ To ensure minimum interference and easy recoverability, the ransomware
simulation will only encrypt files contained in a user-specified directory. If simulation will only encrypt files contained in a user-specified directory. If
no directory is specified, no files will be encrypted. no directory is specified, no files will be encrypted.
Infection Monkey appends the `.m0nk3y` file extension to files that it
encrypts. You may optionally provide a custom file extension for Infection
Monkey to use instead. You can even provide no file extension, but take
caution: you'll no longer be able to tell if the file has been encrypted based
on the filename alone!
![Ransomware configuration](/images/usage/scenarios/ransomware-config.png "Ransomware configuration") ![Ransomware configuration](/images/usage/scenarios/ransomware-config.png "Ransomware configuration")
### How are the files encrypted? ### How are the files encrypted?
Files are "encrypted" in place with a simple bit flip. Encrypted files are Files are "encrypted" in place with a simple bit flip. Encrypted files are
renamed to have `.m0nk3y` appended to their names. This is a safe way to renamed to have a file extension (`.m0nk3y` by default) appended to their
simulate encryption since it is easy to "decrypt" your files. You can simply names. This is a safe way to simulate encryption since it is easy to "decrypt"
perform a bit flip on the files again and rename them to remove the appended your files. You can simply perform a bit flip on the files again and rename
`.m0nk3y` extension. them to remove the appended `.m0nk3y` extension.
Flipping a file's bits is sufficient to simulate the encryption behavior of Flipping a file's bits is sufficient to simulate the encryption behavior of
ransomware, as the data in your files has been manipulated (leaving them ransomware, as the data in your files has been manipulated (leaving them

Binary file not shown.

Before

Width:  |  Height:  |  Size: 140 KiB

After

Width:  |  Height:  |  Size: 436 KiB