forked from p15670423/monkey
Update MITRE images in documentation
This commit is contained in:
parent
62c4eeb3fc
commit
8bc4ae9bcf
|
@ -18,13 +18,14 @@ Watch an overview video:
|
||||||
|
|
||||||
The MITRE ATT&CK report is centred around the ATT&CK matrix:
|
The MITRE ATT&CK report is centred around the ATT&CK matrix:
|
||||||
|
|
||||||
![MITRE Report](/images/usage/reports/mitre-report-0.jpg "MITRE Report")
|
![MITRE Report](/images/usage/reports/mitre-report-0.png "MITRE Report")
|
||||||
|
|
||||||
The Monkey rates your network on the attack techniques it attempted. For each technique, you can get
|
The Monkey rates your network on the attack techniques it attempted. For each technique, you can get
|
||||||
|
|
||||||
- {{< label danger Red >}}: The Monkey **successfully used** the technique in the simulation. That means your network is vulnerable to this technique being employed.
|
- {{< label danger Red >}}: The Monkey **successfully used** the technique in the simulation. That means your network is vulnerable to this technique being employed.
|
||||||
- {{< label warning Yellow >}}: The Monkey **tried to use** the technique, but didn’t manage to. That means your network isn’t vulnerable to the way Monkey employs this technique.
|
- {{< label warning Yellow >}}: The Monkey **tried to use** the technique, but didn’t manage to. That means your network isn’t vulnerable to the way Monkey employs this technique.
|
||||||
- {{< label other Grey >}}: The Monkey **didn't try** the technique this time. Perhaps it wasn't relevant to this network or wasn't configured.
|
- {{< label unused "Dark Gray" >}}: The Monkey **didn't try** the technique this time. Perhaps it wasn't relevant to this network.
|
||||||
|
- {{< label disabled "Light Gray" >}}: The Monkey **didn't try** the technique this time since it wasn't configured.
|
||||||
|
|
||||||
Then, you can see exactly HOW the technique was used in this attack, and also what you should do to mitigate it, by clicking on the technique and seeing the details. For example, let’s look at the [**Brute Force**](https://attack.mitre.org/techniques/T1110/) technique that’s a part of employing the [**Credentials Access**](https://attack.mitre.org/tactics/TA0006/) tactic:
|
Then, you can see exactly HOW the technique was used in this attack, and also what you should do to mitigate it, by clicking on the technique and seeing the details. For example, let’s look at the [**Brute Force**](https://attack.mitre.org/techniques/T1110/) technique that’s a part of employing the [**Credentials Access**](https://attack.mitre.org/tactics/TA0006/) tactic:
|
||||||
|
|
||||||
|
|
|
@ -9,4 +9,5 @@
|
||||||
.info {background-color: #2196F3;} /* Blue */
|
.info {background-color: #2196F3;} /* Blue */
|
||||||
.warning {background-color: #ff9800;} /* Orange */
|
.warning {background-color: #ff9800;} /* Orange */
|
||||||
.danger {background-color: #f44336;} /* Red */
|
.danger {background-color: #f44336;} /* Red */
|
||||||
.other {background-color: #e7e7e7; color: black;} /* Gray */
|
.unused {background-color: #8d8d8d;} /* Dark Gray */
|
||||||
|
.disabled {background-color: #cfcfcf; color: black;} /* Light Gray */
|
||||||
|
|
Binary file not shown.
Before Width: | Height: | Size: 172 KiB |
Binary file not shown.
After Width: | Height: | Size: 159 KiB |
Loading…
Reference in New Issue