From 4535c26a5c687604dfef0464e0df05bdf3f1f08e Mon Sep 17 00:00:00 2001 From: Ilija Lazoroski Date: Wed, 10 Aug 2022 14:13:42 +0200 Subject: [PATCH 1/5] Agent: Change Guardicore link in ransowmare readme --- .../infection_monkey/payload/ransomware/ransomware_readme.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/monkey/infection_monkey/payload/ransomware/ransomware_readme.txt b/monkey/infection_monkey/payload/ransomware/ransomware_readme.txt index e3131c465..be4386c56 100644 --- a/monkey/infection_monkey/payload/ransomware/ransomware_readme.txt +++ b/monkey/infection_monkey/payload/ransomware/ransomware_readme.txt @@ -44,7 +44,7 @@ Infection Monkey is an open-source breach and attack simulation (BAS) platform. directory have been manipulated as part of a ransomware simulation. If you've discovered this file and are unsure about how to proceed, please contact your administrator. -For more information about Infection Monkey, see https://www.guardicore.com/infectionmonkey. +For more information about Infection Monkey, see https://www.akamai.com/infectionmonkey. For more information about Infection Monkey's ransomware simulation, see https://www.guardicore.com/infectionmonkey/docs/reference/ransomware. From 32634ce164e181417128d195e4ae7b6634e5db0d Mon Sep 17 00:00:00 2001 From: Ilija Lazoroski Date: Wed, 10 Aug 2022 14:14:19 +0200 Subject: [PATCH 2/5] Island: Replace Guardicore links with Akamai links --- monkey/monkey_island/cc/ui/src/components/logo/LogoComponent.js | 2 +- .../components/report-components/ransomware/AttackSection.tsx | 1 + .../components/report-components/ransomware/BreachSection.tsx | 2 +- .../components/report-components/ransomware/LateralMovement.tsx | 2 +- monkey/monkey_island/docs/source/index.rst | 2 +- 5 files changed, 5 insertions(+), 4 deletions(-) diff --git a/monkey/monkey_island/cc/ui/src/components/logo/LogoComponent.js b/monkey/monkey_island/cc/ui/src/components/logo/LogoComponent.js index 0fb961bf9..361577590 100644 --- a/monkey/monkey_island/cc/ui/src/components/logo/LogoComponent.js +++ b/monkey/monkey_island/cc/ui/src/components/logo/LogoComponent.js @@ -13,7 +13,7 @@ function Logo() {
Powered by - + GuardiCore
diff --git a/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx b/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx index 10f39e4b0..433e1a75a 100644 --- a/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx +++ b/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx @@ -5,6 +5,7 @@ import NumberedReportSection from './NumberedReportSection'; import LoadingIcon from '../../ui-components/LoadingIcon'; import ExternalLink from '../common/ExternalLink'; +// TODO: Fix the url const ATTACK_DESCRIPTION = <> After the attacker or malware has propagated through your network, your data is at risk on any machine the attacker can access. It can be diff --git a/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/BreachSection.tsx b/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/BreachSection.tsx index fb4498e8e..91e894518 100644 --- a/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/BreachSection.tsx +++ b/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/BreachSection.tsx @@ -13,7 +13,7 @@ const BREACH_DESCRIPTION = <>

diff --git a/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/LateralMovement.tsx b/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/LateralMovement.tsx index 75af68ea5..682b1d632 100644 --- a/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/LateralMovement.tsx +++ b/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/LateralMovement.tsx @@ -12,7 +12,7 @@ const LATERAL_MOVEMENT_DESCRIPTION = <>

diff --git a/monkey/monkey_island/docs/source/index.rst b/monkey/monkey_island/docs/source/index.rst index 6ad76d390..bffb6b78a 100644 --- a/monkey/monkey_island/docs/source/index.rst +++ b/monkey/monkey_island/docs/source/index.rst @@ -65,7 +65,7 @@ The results of running Monkey Agents are: Getting Started =============== -If you haven't downloaded Infection Monkey yet you can do so `from our homepage `_. +If you haven't downloaded Infection Monkey yet you can do so `from our homepage `_. .. After downloading the Monkey, install it using one of our [setup guides]({{< ref "/setup" >}}), and read our [getting started guide]({{< ref "/usage/getting-started" >}}) for a quick-start on Monkey! From 2f7a32efb138319475366d46059aa9982fb3e07b Mon Sep 17 00:00:00 2001 From: Ilija Lazoroski Date: Wed, 10 Aug 2022 14:14:47 +0200 Subject: [PATCH 3/5] Docs: Replace Guardicore links with Akamai links --- docs/content/FAQ/_index.md | 2 +- docs/content/_index.md | 4 ++-- docs/content/usage/_index.md | 2 +- docs/content/usage/file-checksums.md | 2 +- .../usage/scenarios/custom-scenario/network-segmentation.md | 2 +- 5 files changed, 6 insertions(+), 6 deletions(-) diff --git a/docs/content/FAQ/_index.md b/docs/content/FAQ/_index.md index c3a16e81b..f05f65a31 100644 --- a/docs/content/FAQ/_index.md +++ b/docs/content/FAQ/_index.md @@ -36,7 +36,7 @@ Below are some of the most common questions we receive about the Infection Monke ## Where can I get the latest version of the Infection Monkey? -For the latest **stable** release, visit [our downloads page](https://www.guardicore.com/infectionmonkey/#download). **This is the recommended and supported version**! +For the latest **stable** release, visit [our downloads page](https://www.akamai.com/infectionmonkey#download). **This is the recommended and supported version**! If you want to see what has changed between versions, refer to the [releases page on GitHub](https://github.com/guardicore/monkey/releases). For the latest development version, visit the [develop version on GitHub](https://github.com/guardicore/monkey/tree/develop). diff --git a/docs/content/_index.md b/docs/content/_index.md index 88448acb8..5aaaf6dbc 100644 --- a/docs/content/_index.md +++ b/docs/content/_index.md @@ -13,7 +13,7 @@ draft: false The Infection Monkey is an open-source breach and attack simulation tool for testing a data center's resiliency to perimeter breaches and internal server infection. Infection Monkey will help you validate existing security solutions and will provide a view of the internal network from an attacker's perspective. -Infection Monkey is free and can be downloaded from [our homepage](https://infectionmonkey.com/). +Infection Monkey is free and can be downloaded from [our homepage](https://www.akamai.com/infectionmonkey). ![Infection Monkey Documentation Hub Logo](/images/monkey-teacher.svg?height=400px "Infection Monkey Documentation Hub Logo") @@ -40,7 +40,7 @@ A more in-depth description of reports generated can be found in the [reports do ## Getting Started -If you haven't downloaded Infection Monkey yet you can do so [from our homepage](https://www.guardicore.com/infectionmonkey/#download). After downloading the Monkey, install it using one of our [setup guides]({{< ref "/setup" >}}), and read our [getting started guide]({{< ref "/usage/getting-started" >}}) for a quick-start on Monkey! +If you haven't downloaded Infection Monkey yet you can do so [from our homepage](https://www.akamai.com/infectionmonkey#download). After downloading the Monkey, install it using one of our [setup guides]({{< ref "/setup" >}}), and read our [getting started guide]({{< ref "/usage/getting-started" >}}) for a quick-start on Monkey! ## Support and community diff --git a/docs/content/usage/_index.md b/docs/content/usage/_index.md index 8bbbab800..afdaae60e 100644 --- a/docs/content/usage/_index.md +++ b/docs/content/usage/_index.md @@ -10,4 +10,4 @@ pre = ' ' If you're new to the Infection Monkey, check out our [Getting Started](getting-started) page. -If you haven't downloaded the Infection Monkey yet, {{% button href="https://www.guardicore.com/infectionmonkey/#download" icon="fas fa-download" %}}Get Infection Monkey here{{% /button %}}! +If you haven't downloaded the Infection Monkey yet, {{% button href="https://www.akamai.com/infectionmonkey#download" icon="fas fa-download" %}}Get Infection Monkey here{{% /button %}}! diff --git a/docs/content/usage/file-checksums.md b/docs/content/usage/file-checksums.md index bd87ee049..2c35b19d9 100644 --- a/docs/content/usage/file-checksums.md +++ b/docs/content/usage/file-checksums.md @@ -6,7 +6,7 @@ weight: 100 pre: " " --- -The official distribution of Infection Monkey is compiled and supplied by Guardicore ([download from our official site here](https://www.guardicore.com/infectionmonkey/#download)). The team signs all software packages to certify that a particular Infection Monkey package is a valid and unaltered Infection Monkey release. Before installing Monkey, you should validate the package using the SHA-256 checksum. +The official distribution of Infection Monkey is compiled and supplied by Guardicore ([download from our official site here](https://www.akamai.com/infectionmonkey#download)). The team signs all software packages to certify that a particular Infection Monkey package is a valid and unaltered Infection Monkey release. Before installing Monkey, you should validate the package using the SHA-256 checksum. ## How to get SHA-256 checksum diff --git a/docs/content/usage/scenarios/custom-scenario/network-segmentation.md b/docs/content/usage/scenarios/custom-scenario/network-segmentation.md index 87fe24f24..86db82d06 100644 --- a/docs/content/usage/scenarios/custom-scenario/network-segmentation.md +++ b/docs/content/usage/scenarios/custom-scenario/network-segmentation.md @@ -10,7 +10,7 @@ weight: 4 Segmentation is a method of creating secure zones in data centers and cloud deployments. It allows organizations to isolate workloads from one another and secure them individually, typically using policies. A useful way to test your company's segmentation effectiveness is to ensure that your network segments are properly separated (e.g., your development environment is isolated from your production environment and your applications are isolated from one another). -[Segmentation is key](https://www.guardicore.com/use-cases/micro-segmentation/) to protecting your network. It can reduce the network's attack surface and minimize the damage caused during a breach. +[Segmentation is key](https://www.akamai.com/products/akamai-segmentation/use-cases) to protecting your network. It can reduce the network's attack surface and minimize the damage caused during a breach. You can use the Infection Monkey's cross-segment traffic feature to verify that your network segmentation configuration is adequate. This way, you can ensure that, even if a bad actor breaches your defenses, they can't move laterally between segments. From 53c2a1d5c484665ffdd1e3c0b1ff5043e6cedcaf Mon Sep 17 00:00:00 2001 From: Ilija Lazoroski Date: Wed, 10 Aug 2022 14:15:59 +0200 Subject: [PATCH 4/5] Project: Replace Guardicore links with Akamai links Fix one link in ISSUE template --- .github/ISSUE_TEMPLATE/config.yml | 2 +- README.md | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/ISSUE_TEMPLATE/config.yml b/.github/ISSUE_TEMPLATE/config.yml index be6fc881d..bb698ba52 100644 --- a/.github/ISSUE_TEMPLATE/config.yml +++ b/.github/ISSUE_TEMPLATE/config.yml @@ -4,5 +4,5 @@ contact_links: url: https://join.slack.com/t/infectionmonkey/shared_invite/enQtNDU5MjAxMjg1MjU1LWM0NjVmNWE2ZTMzYzAxOWJiYmMxMzU0NWU3NmUxYjcyNjk0YWY2MDkwODk4NGMyNDU4NzA4MDljOWNmZWViNDU about: Our community Slack channel - you can ask questions or suggest things here. - name: FAQs - url: https://www.guardicore.com/infectionmonkey/faq/ + url: https://www.guardicore.com/infectionmonkey/docs/faq/ about: Frequently Asked Questions - if you have a question, see if we've already answered it! diff --git a/README.md b/README.md index 618cf7b99..b1079eca0 100644 --- a/README.md +++ b/README.md @@ -18,14 +18,14 @@ The Infection Monkey is comprised of two parts: * **Monkey** - A tool which infects other machines and propagates to them. * **Monkey Island** - A dedicated server to control and visualize the Infection Monkey's progress inside the data center. -To read more about the Monkey, visit [infectionmonkey.com](https://infectionmonkey.com). +To read more about the Monkey, visit [akamai.com/infectionmonkey](https://www.akamai.com/infectionmonkey). ## 💥 We're Hiring 💥 We are looking for a senior developer with a passion for cybersecurity to join the Infection Monkey development team. This is a remote position and is open anywhere in the US Eastern timezone or in Brazil. If you're excited about Infection Monkey, we want to see your resume. You can learn more about Infection Monkey on our -[website](https://www.guardicore.com/infectionmonkey/). +[website](https://www.akamai.com/infectionmonkey). For more information, or to apply, see the official job post: - [USA](https://akamaicareers.inflightcloud.com/jobdetails/aka_ext/028789?section=aka_ext&job=028789). From 4da0b5fcff6065c34f1594148e29d64ebf4898c5 Mon Sep 17 00:00:00 2001 From: Ilija Lazoroski Date: Wed, 10 Aug 2022 14:34:13 +0200 Subject: [PATCH 5/5] Docs, Island: Replace broken links with wayback machine links These needs to be changed when we have live ones from Akamai. --- .../usage/scenarios/custom-scenario/credential-leak.md | 2 +- .../content/usage/scenarios/custom-scenario/network-breach.md | 4 ++-- .../components/report-components/ransomware/AttackSection.tsx | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/content/usage/scenarios/custom-scenario/credential-leak.md b/docs/content/usage/scenarios/custom-scenario/credential-leak.md index a2cc0b8ce..c5aeced50 100644 --- a/docs/content/usage/scenarios/custom-scenario/credential-leak.md +++ b/docs/content/usage/scenarios/custom-scenario/credential-leak.md @@ -9,7 +9,7 @@ weight: 5 ## Overview Numerous attack techniques (from phishing to dumpster diving) might result in a credential leak, -which can be **extremely costly** as demonstrated in our report [IResponse to IEncrypt](https://www.guardicore.com/2019/04/iresponse-to-iencrypt/). +which can be **extremely costly** as demonstrated in our report [IResponse to IEncrypt](https://web.archive.org/web/20210117224801/https://www.guardicore.com/2019/04/iresponse-to-iencrypt/). The Infection Monkey can help you assess the impact of stolen credentials by automatically searching where bad actors can reuse these credentials in your network. diff --git a/docs/content/usage/scenarios/custom-scenario/network-breach.md b/docs/content/usage/scenarios/custom-scenario/network-breach.md index 22fc3b9dc..4d0a6a814 100644 --- a/docs/content/usage/scenarios/custom-scenario/network-breach.md +++ b/docs/content/usage/scenarios/custom-scenario/network-breach.md @@ -8,8 +8,8 @@ weight: 3 ## Overview -From the [Hex-Men campaign](https://www.guardicore.com/2017/12/beware-the-hex-men/) that hit -internet-facing DB servers to a [cryptomining operation that attacks WordPress sites](https://www.guardicore.com/2018/06/operation-prowli-traffic-manipulation-cryptocurrency-mining-2/) or any other malicious campaign – attackers are now trying to go deeper into your network. +From the [Hex-Men campaign](https://web.archive.org/web/20210115171355/https://www.guardicore.com/2017/12/beware-the-hex-men/) that hit +internet-facing DB servers to a [cryptomining operation that attacks WordPress sites](https://web.archive.org/web/20210115185135/https://www.guardicore.com/2018/06/operation-prowli-traffic-manipulation-cryptocurrency-mining-2/) or any other malicious campaign – attackers are now trying to go deeper into your network. Infection Monkey will help you assess the impact of a future breach by attempting to propagate within your internal network using service vulnerabilities, brute-forcing and other safe exploiters. diff --git a/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx b/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx index 433e1a75a..fbc51ea89 100644 --- a/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx +++ b/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx @@ -14,7 +14,7 @@ const ATTACK_DESCRIPTION = <>