infection monkey - 情報セキュリティ株式会社 · about infection monkey 3 •the...
TRANSCRIPT
Information Security Inc
Infection Monkey
Information Security Confidential - Partner Use Only
Contents
2
bull About Infection Monkey
bull Architecture
bull Requirements
bull Testing Setup
bull Installing Infection Monkey
bull Running Infection Monkey
bull References
Information Security Confidential - Partner Use Only
About Infection Monkey
3
bull The Infection Monkey is an open source security tool for testing a
data centers resiliency to perimeter breaches and internal server
infection
bull The Monkey uses various methods to self propagate across a data
center and reports success to a centralized Command and
Control(CampC) server
Information Security Confidential - Partner Use Only
Architecture
4
bull Monkey - A tool which infects other machines and propagates to
them
bull Monkey Island - A CampC server with a dedicated UI to visualize the
Chaos Monkeys progress inside the data center
Information Security Confidential - Partner Use Only
Architecture
5
bull The monkey is composed of three separate parts
bull The Infection Monkey itself - PyInstaller compressed python
archives
bull Sambacry binaries - Two linux binaries 3264 bit
bull Mimikatz binaries - Two windows binaries 3264 bit
Information Security Confidential - Partner Use Only
Requirements
6
bull The CampC Server has been tested on Ubuntu 14041504 and
1604
bull The Monkey itself has been tested on Windows XP 7 81 and 10
bull The Linux build has been tested on Ubuntu server (multiple
versions)
Information Security Confidential - Partner Use Only
Testing Setup
7
------------------
|Monkey |
| Kali |
| Linux | +++++++
-------------------
IP1921681012
----------------
| Browser | +++++++
| Edge |
| Windows10| ----------------------
---------------- +++++++++++++ | Ubuntu 1604 |
IP 19216810101 | Monkey |
| Island |
------------------IP 192168878
Information Security Confidential - Partner Use Only
Installing Infection Monkey
8
bull Installing the InfectionMonkey on Linux
bull Downloading Infection Monkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
9
bull Installing the InfectionMonkey on Linux
bull Unpacking the tarball
Information Security Confidential - Partner Use Only
Installing Infection Monkey
10
bull Installing the InfectionMonkey on Linux
bull Installing Flask-pymongo
Information Security Confidential - Partner Use Only
Installing Infection Monkey
11
bull Installing the Monkey on Linux
bull Installing the Monkey Island
Information Security Confidential - Partner Use Only
Installing Infection Monkey
12
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Contents
2
bull About Infection Monkey
bull Architecture
bull Requirements
bull Testing Setup
bull Installing Infection Monkey
bull Running Infection Monkey
bull References
Information Security Confidential - Partner Use Only
About Infection Monkey
3
bull The Infection Monkey is an open source security tool for testing a
data centers resiliency to perimeter breaches and internal server
infection
bull The Monkey uses various methods to self propagate across a data
center and reports success to a centralized Command and
Control(CampC) server
Information Security Confidential - Partner Use Only
Architecture
4
bull Monkey - A tool which infects other machines and propagates to
them
bull Monkey Island - A CampC server with a dedicated UI to visualize the
Chaos Monkeys progress inside the data center
Information Security Confidential - Partner Use Only
Architecture
5
bull The monkey is composed of three separate parts
bull The Infection Monkey itself - PyInstaller compressed python
archives
bull Sambacry binaries - Two linux binaries 3264 bit
bull Mimikatz binaries - Two windows binaries 3264 bit
Information Security Confidential - Partner Use Only
Requirements
6
bull The CampC Server has been tested on Ubuntu 14041504 and
1604
bull The Monkey itself has been tested on Windows XP 7 81 and 10
bull The Linux build has been tested on Ubuntu server (multiple
versions)
Information Security Confidential - Partner Use Only
Testing Setup
7
------------------
|Monkey |
| Kali |
| Linux | +++++++
-------------------
IP1921681012
----------------
| Browser | +++++++
| Edge |
| Windows10| ----------------------
---------------- +++++++++++++ | Ubuntu 1604 |
IP 19216810101 | Monkey |
| Island |
------------------IP 192168878
Information Security Confidential - Partner Use Only
Installing Infection Monkey
8
bull Installing the InfectionMonkey on Linux
bull Downloading Infection Monkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
9
bull Installing the InfectionMonkey on Linux
bull Unpacking the tarball
Information Security Confidential - Partner Use Only
Installing Infection Monkey
10
bull Installing the InfectionMonkey on Linux
bull Installing Flask-pymongo
Information Security Confidential - Partner Use Only
Installing Infection Monkey
11
bull Installing the Monkey on Linux
bull Installing the Monkey Island
Information Security Confidential - Partner Use Only
Installing Infection Monkey
12
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
About Infection Monkey
3
bull The Infection Monkey is an open source security tool for testing a
data centers resiliency to perimeter breaches and internal server
infection
bull The Monkey uses various methods to self propagate across a data
center and reports success to a centralized Command and
Control(CampC) server
Information Security Confidential - Partner Use Only
Architecture
4
bull Monkey - A tool which infects other machines and propagates to
them
bull Monkey Island - A CampC server with a dedicated UI to visualize the
Chaos Monkeys progress inside the data center
Information Security Confidential - Partner Use Only
Architecture
5
bull The monkey is composed of three separate parts
bull The Infection Monkey itself - PyInstaller compressed python
archives
bull Sambacry binaries - Two linux binaries 3264 bit
bull Mimikatz binaries - Two windows binaries 3264 bit
Information Security Confidential - Partner Use Only
Requirements
6
bull The CampC Server has been tested on Ubuntu 14041504 and
1604
bull The Monkey itself has been tested on Windows XP 7 81 and 10
bull The Linux build has been tested on Ubuntu server (multiple
versions)
Information Security Confidential - Partner Use Only
Testing Setup
7
------------------
|Monkey |
| Kali |
| Linux | +++++++
-------------------
IP1921681012
----------------
| Browser | +++++++
| Edge |
| Windows10| ----------------------
---------------- +++++++++++++ | Ubuntu 1604 |
IP 19216810101 | Monkey |
| Island |
------------------IP 192168878
Information Security Confidential - Partner Use Only
Installing Infection Monkey
8
bull Installing the InfectionMonkey on Linux
bull Downloading Infection Monkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
9
bull Installing the InfectionMonkey on Linux
bull Unpacking the tarball
Information Security Confidential - Partner Use Only
Installing Infection Monkey
10
bull Installing the InfectionMonkey on Linux
bull Installing Flask-pymongo
Information Security Confidential - Partner Use Only
Installing Infection Monkey
11
bull Installing the Monkey on Linux
bull Installing the Monkey Island
Information Security Confidential - Partner Use Only
Installing Infection Monkey
12
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Architecture
4
bull Monkey - A tool which infects other machines and propagates to
them
bull Monkey Island - A CampC server with a dedicated UI to visualize the
Chaos Monkeys progress inside the data center
Information Security Confidential - Partner Use Only
Architecture
5
bull The monkey is composed of three separate parts
bull The Infection Monkey itself - PyInstaller compressed python
archives
bull Sambacry binaries - Two linux binaries 3264 bit
bull Mimikatz binaries - Two windows binaries 3264 bit
Information Security Confidential - Partner Use Only
Requirements
6
bull The CampC Server has been tested on Ubuntu 14041504 and
1604
bull The Monkey itself has been tested on Windows XP 7 81 and 10
bull The Linux build has been tested on Ubuntu server (multiple
versions)
Information Security Confidential - Partner Use Only
Testing Setup
7
------------------
|Monkey |
| Kali |
| Linux | +++++++
-------------------
IP1921681012
----------------
| Browser | +++++++
| Edge |
| Windows10| ----------------------
---------------- +++++++++++++ | Ubuntu 1604 |
IP 19216810101 | Monkey |
| Island |
------------------IP 192168878
Information Security Confidential - Partner Use Only
Installing Infection Monkey
8
bull Installing the InfectionMonkey on Linux
bull Downloading Infection Monkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
9
bull Installing the InfectionMonkey on Linux
bull Unpacking the tarball
Information Security Confidential - Partner Use Only
Installing Infection Monkey
10
bull Installing the InfectionMonkey on Linux
bull Installing Flask-pymongo
Information Security Confidential - Partner Use Only
Installing Infection Monkey
11
bull Installing the Monkey on Linux
bull Installing the Monkey Island
Information Security Confidential - Partner Use Only
Installing Infection Monkey
12
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Architecture
5
bull The monkey is composed of three separate parts
bull The Infection Monkey itself - PyInstaller compressed python
archives
bull Sambacry binaries - Two linux binaries 3264 bit
bull Mimikatz binaries - Two windows binaries 3264 bit
Information Security Confidential - Partner Use Only
Requirements
6
bull The CampC Server has been tested on Ubuntu 14041504 and
1604
bull The Monkey itself has been tested on Windows XP 7 81 and 10
bull The Linux build has been tested on Ubuntu server (multiple
versions)
Information Security Confidential - Partner Use Only
Testing Setup
7
------------------
|Monkey |
| Kali |
| Linux | +++++++
-------------------
IP1921681012
----------------
| Browser | +++++++
| Edge |
| Windows10| ----------------------
---------------- +++++++++++++ | Ubuntu 1604 |
IP 19216810101 | Monkey |
| Island |
------------------IP 192168878
Information Security Confidential - Partner Use Only
Installing Infection Monkey
8
bull Installing the InfectionMonkey on Linux
bull Downloading Infection Monkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
9
bull Installing the InfectionMonkey on Linux
bull Unpacking the tarball
Information Security Confidential - Partner Use Only
Installing Infection Monkey
10
bull Installing the InfectionMonkey on Linux
bull Installing Flask-pymongo
Information Security Confidential - Partner Use Only
Installing Infection Monkey
11
bull Installing the Monkey on Linux
bull Installing the Monkey Island
Information Security Confidential - Partner Use Only
Installing Infection Monkey
12
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Requirements
6
bull The CampC Server has been tested on Ubuntu 14041504 and
1604
bull The Monkey itself has been tested on Windows XP 7 81 and 10
bull The Linux build has been tested on Ubuntu server (multiple
versions)
Information Security Confidential - Partner Use Only
Testing Setup
7
------------------
|Monkey |
| Kali |
| Linux | +++++++
-------------------
IP1921681012
----------------
| Browser | +++++++
| Edge |
| Windows10| ----------------------
---------------- +++++++++++++ | Ubuntu 1604 |
IP 19216810101 | Monkey |
| Island |
------------------IP 192168878
Information Security Confidential - Partner Use Only
Installing Infection Monkey
8
bull Installing the InfectionMonkey on Linux
bull Downloading Infection Monkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
9
bull Installing the InfectionMonkey on Linux
bull Unpacking the tarball
Information Security Confidential - Partner Use Only
Installing Infection Monkey
10
bull Installing the InfectionMonkey on Linux
bull Installing Flask-pymongo
Information Security Confidential - Partner Use Only
Installing Infection Monkey
11
bull Installing the Monkey on Linux
bull Installing the Monkey Island
Information Security Confidential - Partner Use Only
Installing Infection Monkey
12
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Testing Setup
7
------------------
|Monkey |
| Kali |
| Linux | +++++++
-------------------
IP1921681012
----------------
| Browser | +++++++
| Edge |
| Windows10| ----------------------
---------------- +++++++++++++ | Ubuntu 1604 |
IP 19216810101 | Monkey |
| Island |
------------------IP 192168878
Information Security Confidential - Partner Use Only
Installing Infection Monkey
8
bull Installing the InfectionMonkey on Linux
bull Downloading Infection Monkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
9
bull Installing the InfectionMonkey on Linux
bull Unpacking the tarball
Information Security Confidential - Partner Use Only
Installing Infection Monkey
10
bull Installing the InfectionMonkey on Linux
bull Installing Flask-pymongo
Information Security Confidential - Partner Use Only
Installing Infection Monkey
11
bull Installing the Monkey on Linux
bull Installing the Monkey Island
Information Security Confidential - Partner Use Only
Installing Infection Monkey
12
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
8
bull Installing the InfectionMonkey on Linux
bull Downloading Infection Monkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
9
bull Installing the InfectionMonkey on Linux
bull Unpacking the tarball
Information Security Confidential - Partner Use Only
Installing Infection Monkey
10
bull Installing the InfectionMonkey on Linux
bull Installing Flask-pymongo
Information Security Confidential - Partner Use Only
Installing Infection Monkey
11
bull Installing the Monkey on Linux
bull Installing the Monkey Island
Information Security Confidential - Partner Use Only
Installing Infection Monkey
12
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
9
bull Installing the InfectionMonkey on Linux
bull Unpacking the tarball
Information Security Confidential - Partner Use Only
Installing Infection Monkey
10
bull Installing the InfectionMonkey on Linux
bull Installing Flask-pymongo
Information Security Confidential - Partner Use Only
Installing Infection Monkey
11
bull Installing the Monkey on Linux
bull Installing the Monkey Island
Information Security Confidential - Partner Use Only
Installing Infection Monkey
12
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
10
bull Installing the InfectionMonkey on Linux
bull Installing Flask-pymongo
Information Security Confidential - Partner Use Only
Installing Infection Monkey
11
bull Installing the Monkey on Linux
bull Installing the Monkey Island
Information Security Confidential - Partner Use Only
Installing Infection Monkey
12
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
11
bull Installing the Monkey on Linux
bull Installing the Monkey Island
Information Security Confidential - Partner Use Only
Installing Infection Monkey
12
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
12
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
13
bull Installing the Monkey on Linux
bull Verify the Monkey service is functional
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Installing Infection Monkey
14
bull Access the Monkeyrsquos Island GUI by browsing to
https1921688785000adminindexhtml
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Running Infection Monkey
15
bull The Monkey can be run in two ways =gt
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Running Infection Monkey
16
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Running Infection Monkey
17
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Running Infection Monkey
18
1) With the Monkey Island as the initial attacker This will use the
Monkey Island server as a starting position for the Monkey from
which it will expand based on the configuration
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Running Infection Monkey
19
2) Running the Monkey from a machine elsewhere network
Download the appropriate Monkey executable (LinuxWindows and
matching 3264 bitness) using the following path
https1921688785000apimonkeydownload[binaryToDownload]
(monkey-windows-32exe monkey-windows-64exe monkey-linux-
32 monkey-linux-64)
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Running Infection Monkey
20
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Running Infection Monkey
21
bull Execute the Monkey from the console passing the server address
as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
Running Infection Monkey
22
bull 2) Execute the Monkey from the console passing the server
address as a parameter and the magic keyword for execution
bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey
Information Security Confidential - Partner Use Only
References
23
bull Official website
httpswwwguardicorecominfectionmonkey
bull Github
httpsgithubcomguardicoremonkey