forked from p15670423/monkey
975 B
975 B
+++ title = "Use Cases" date = 2020-08-12T12:52:59+03:00 weight = 3 chapter = true pre = " " +++
Use cases
This section describes possible use cases for the "Infection Monkey" and helps to understand how this tool can be configured. You can also refer to our FAQ for more specific questions and answers.
{{% notice note %}} No worries! The Monkey uses safe exploiters and does not cause any permanent system modifications that impact security or operations. {{% /notice %}}
Section contents:
- Network breach - Simulate internal network breach.
- Network segmentation - Test network segmentation.
- Credential leak - Assess the impact of successful phishing attack or other form of credential leak.
- IDS/IPS Test - Test your network defence solutions.
- Other - Tips and tricks about configuring monkey for your needs.