title |
date |
draft |
description |
Credentials |
2020-06-09T12:20:08+03:00 |
false |
Configure credentials that the Monkey will use for propagation. |
On this screen you can feed the Infection Monkey “stolen” credentials from your network, simulating an attacker with inside knowledge.