2020-06-25 03:25:19 +08:00
---
title: "Security report"
date: 2020-06-24T21:16:10+03:00
2021-08-06 20:14:23 +08:00
weight: 1
2020-06-25 03:25:19 +08:00
draft: false
2021-01-05 04:29:04 +08:00
description: "Provides actionable recommendations and insight into an attacker's view of your network"
2020-06-25 03:25:19 +08:00
---
2020-07-09 23:31:17 +08:00
{{% notice info %}}
2021-04-09 21:35:18 +08:00
Check out [the documentation for other reports available in the Infection Monkey ]({{< ref "/reports" >}} ).
2020-07-09 23:31:17 +08:00
{{% /notice %}}
2021-02-22 20:06:56 +08:00
The Infection Monkey's **Security Report** provides you with actionable recommendations and insight into an attacker's view of your network. You can download a PDF of an example report here:
2020-07-09 23:31:17 +08:00
{{%attachments title="Download the PDF" pattern=".*(pdf)"/%}}
2021-02-22 20:06:56 +08:00
The report is split into three main categories:
2020-07-09 23:31:17 +08:00
- [Overview ](#overview )
2021-02-22 20:06:56 +08:00
- [High-level information ](#high-level-information )
- [Used credentials ](#used-credentials )
2020-07-09 23:31:17 +08:00
- [Exploits and targets ](#exploits-and-targets )
2021-02-22 20:06:56 +08:00
- [Security findings ](#security-findings )
2020-07-09 23:31:17 +08:00
- [Recommendations ](#recommendations )
2021-02-22 20:06:56 +08:00
- [Machine-related recommendations relating to specific CVEs ](#machine-related-recommendations-relating-to-specific-cves )
- [Machine-related recommendations relating to network security and segmentation ](#machine-related-recommendations-relating-to-network-security-and-segmentation )
2020-07-09 23:31:17 +08:00
- [The network from the Monkey's eyes ](#the-network-from-the-monkeys-eyes )
- [Network infection map ](#network-infection-map )
- [Scanned servers ](#scanned-servers )
- [Exploits and post-breach actions ](#exploits-and-post-breach-actions )
2021-02-22 20:06:56 +08:00
- [Stolen credentials ](#stolen-credentials )
2020-06-25 03:25:19 +08:00
## Overview
2021-02-22 20:06:56 +08:00
The overview section of the report provides high-level information about the Infection Monkey's execution and main security findings.
2020-06-25 03:25:19 +08:00
2021-02-22 20:06:56 +08:00
### High-level information
2020-07-09 23:31:17 +08:00
2021-02-22 20:06:56 +08:00
This section shows general information about the Infection Monkey's execution, including which machine the infection originated from and how long the breach simulation took.
2020-07-09 23:31:17 +08:00

2021-02-22 20:06:56 +08:00
### Used credentials
2020-07-09 23:31:17 +08:00
2021-02-22 20:06:56 +08:00
This section shows which credentials were used for brute-forcing.
2020-07-09 23:31:17 +08:00

### Exploits and targets
2021-02-22 20:06:56 +08:00
This section shows which exploits were attempted in this simulation and which targets the Infection Monkey scanned and tried to exploit.
2020-07-09 23:31:17 +08:00

2021-02-22 20:06:56 +08:00
### Security findings
2020-07-09 23:31:17 +08:00
2021-02-22 20:06:56 +08:00
This section highlights the most important security threats and issues discovered during the attack.
2020-07-09 23:31:17 +08:00

2020-06-25 03:25:19 +08:00
## Recommendations
2021-02-22 20:06:56 +08:00
This section contains recommendations for improving your security, including actionable mitigation steps.
2020-06-25 03:25:19 +08:00
2021-02-22 20:06:56 +08:00
### Machine-related recommendations relating to specific CVEs
2020-07-09 23:31:17 +08:00
2021-02-22 20:06:56 +08:00

2020-07-09 23:31:17 +08:00
2021-02-22 20:06:56 +08:00
### Machine-related recommendations relating to network security and segmentation
2020-07-09 23:31:17 +08:00
2021-02-22 20:06:56 +08:00

2020-06-25 03:25:19 +08:00
## The network from the Monkey's eyes
2021-02-22 20:06:56 +08:00
This section contains the infection map and summary tables on servers the Infection Monkey found.
2020-06-25 03:25:19 +08:00
2020-07-09 23:31:17 +08:00
### Network infection map
2021-02-22 20:06:56 +08:00
This section shows the network map and a breakdown of how many machines the Infection Monkey breached.
2020-07-09 23:31:17 +08:00

### Scanned servers
2021-02-22 20:06:56 +08:00
This section shows the attack surface the Infection Monkey discovered.
2020-07-09 23:31:17 +08:00

### Exploits and post-breach actions
2021-02-22 20:06:56 +08:00
This section shows which exploits and post-beach actions the Infection Monkey performed during the simulation.
2020-07-09 23:31:17 +08:00

2021-02-22 20:06:56 +08:00
### Stolen credentials
2020-07-09 23:31:17 +08:00
2021-02-22 20:06:56 +08:00
This section shows which credentials the Infection Monkey was able to steal from breached machines during this simulation.
2020-07-09 23:31:17 +08:00
