docs: Reword scenarios' explanation

Co-authored-by: Mike Salvatore <mike.s.salvatore@gmail.com>
This commit is contained in:
Shreya Malviya 2021-07-28 18:43:28 +05:30 committed by GitHub
parent aa13202fa8
commit d3ab7c7bf3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 1 additions and 1 deletions

View File

@ -14,7 +14,7 @@ This section describes the different attack <i>Scenarios</i> that the Infection
Don't worry! The Infection Monkey uses safe exploiters and does not cause any permanent system modifications that could impact security or operations. Don't worry! The Infection Monkey uses safe exploiters and does not cause any permanent system modifications that could impact security or operations.
{{% /notice %}} {{% /notice %}}
The Infection Monkey has pre-existing scenarios to simulate common types of attacks that take place. These scenarios, when selected, manipulate the default configuration values and only show the configuration fields relevant to the selected scenario. This makes it possible for you to quickly run the Monkey on your network with a targeted configuration. The Infection Monkey has pre-built scenarios to simulate common types of attacks that take place. These scenarios, when selected, manipulate the default configuration values and only show the configuration fields relevant to the selected scenario. This makes it possible for you to quickly run the Monkey on your network in order to accomplish a specific objective.
![Choose scenario](/images/usage/scenarios/choose-scenario.png "Choose a scenario") ![Choose scenario](/images/usage/scenarios/choose-scenario.png "Choose a scenario")