4.0 KiB
title | date | draft | description |
---|---|---|---|
Security report | 2020-06-24T21:16:10+03:00 | false | Provides actionable recommendations and insight into an attacker's view of your network |
{{% notice info %}} Check out the documentation for the other reports as well. {{% /notice %}}
The Monkey's Security Report is built to provide you with actionable recommendations and insight to the Attacker's view of your network. You can download a PDF of this example report:
{{%attachments title="Download the PDF" pattern=".*(pdf)"/%}}
The report is split into 3 main categories: "Overview", "Recommendations" and "The network from the Monkey's eyes".
Overview
The overview section of the report provides high-level information about the Monkey execution and the main security findings that the Monkey has found.
High level information
The report starts with information about the execution, including how long the simulation took and from which machine the infection started from.
Used Credentials
The report will show which credentials were used for brute-forcing.
Exploits and targets
The report shows which exploits were attempted in this simulation and which targets the Monkey scanned and tried to exploit.
Security Findings
The report highlights the most important security threats and issues the Monkey discovered during the attack.
Recommendations
This section contains the Monkey's recommendations for improving your security - what mitigations you need to implement.
Machine related recommendations relating to specific CVEs
Machine related recommendations relating to network security and segmentation
The network from the Monkey's eyes
This section contains the Infection Map and some summary tables on servers the Monkey has found.
Network infection map
This part shows the network map and a breakdown of how many machines were breached.
Scanned servers
This part shows the attack surface the Monkey has found.
Exploits and post-breach actions
This part shows which exploits and Post Breach Actions the Monkey has performed in this simulation.
Stolen Credentials
This part shows which credentials the Monkey was able to steal from breached machines in this simulation.