forked from p15670423/monkey
Fixed more typos and style issues with monkey home documentation page
This commit is contained in:
parent
869d290296
commit
1768a58023
|
@ -11,7 +11,7 @@ draft: false
|
||||||
## What is Guardicore Infection Monkey?
|
## What is Guardicore Infection Monkey?
|
||||||
|
|
||||||
The Infection Monkey is an open-source breach and attack simulation tool for testing a data center's resiliency to perimeter breaches and internal server infection.
|
The Infection Monkey is an open-source breach and attack simulation tool for testing a data center's resiliency to perimeter breaches and internal server infection.
|
||||||
Infection Monkey will help you validate existing security solutions and will provide a view of the internal your network from an attacker's perspective.
|
Infection Monkey will help you validate existing security solutions and will provide a view of the internal network from an attacker's perspective.
|
||||||
|
|
||||||
Infection Monkey is free and can be downloaded from [our homepage](https://infectionmonkey.com/).
|
Infection Monkey is free and can be downloaded from [our homepage](https://infectionmonkey.com/).
|
||||||
|
|
||||||
|
@ -19,13 +19,13 @@ Infection Monkey is free and can be downloaded from [our homepage](https://infec
|
||||||
|
|
||||||
## How it works
|
## How it works
|
||||||
|
|
||||||
Architecturally, Infection Monkey is comprised of two parts:
|
Architecturally, Infection Monkey is comprised of two components:
|
||||||
|
|
||||||
* Monkey Agent (Monkey for short) - a safe, worm-like binary program which scans, propagates and simulates attack techniques on the **local network**.
|
* Monkey Agent (Monkey for short) - a safe, worm-like binary program which scans, propagates and simulates attack techniques on the **local network**.
|
||||||
* Monkey Island Server (Island for short) - a C&C web server which provides a GUI for users and interacts with the Monkey Agents.
|
* Monkey Island Server (Island for short) - a C&C web server which provides a GUI for users and interacts with the Monkey Agents.
|
||||||
|
|
||||||
User runs Monkey Agent on the Island server machine or distributes Monkey Agent binaries on the network manually. Based on
|
The user can run the Monkey Agent on the Island server machine or distribute Monkey Agent binaries on the network manually. Based on
|
||||||
the configuration parameters, Monkey Agents scan, propagate and simulate attackers behavior on the local network. All of the
|
the configuration parameters, Monkey Agents scan, propagate and simulate attacker's behavior on the local network. All of the
|
||||||
information gathered about the network is aggregated in the Island Server and displayed once all Monkey Agents are finished.
|
information gathered about the network is aggregated in the Island Server and displayed once all Monkey Agents are finished.
|
||||||
|
|
||||||
## Results
|
## Results
|
||||||
|
@ -33,7 +33,7 @@ information gathered about the network is aggregated in the Island Server and di
|
||||||
The results of running Monkey Agents are:
|
The results of running Monkey Agents are:
|
||||||
- A map which displays how much of the network an attacker can see, what services are accessible and potential propagation routes.
|
- A map which displays how much of the network an attacker can see, what services are accessible and potential propagation routes.
|
||||||
- A security report, which displays security issues that Monkey Agents discovered and/or exploited.
|
- A security report, which displays security issues that Monkey Agents discovered and/or exploited.
|
||||||
- A Mitre ATT&CK report, which displays the information about the ATT&CK techniques that Monkey Agents tried to use.
|
- A MITRE ATT&CK report, which displays the information about the ATT&CK techniques that Monkey Agents tried to use.
|
||||||
- A Zero Trust report, which displays violations of Zero Trust principles that Monkey Agents found.
|
- A Zero Trust report, which displays violations of Zero Trust principles that Monkey Agents found.
|
||||||
|
|
||||||
A more in-depth description of reports generated can be found in the [reports documentation page](/reports).
|
A more in-depth description of reports generated can be found in the [reports documentation page](/reports).
|
||||||
|
|
Loading…
Reference in New Issue