Infection Monkey V1.6 - An Automated Pentest Tool
Tuesday, September 24, 2019
Edit
Infection Monkey V1.6 - An Automated Pentest Tool - Hi friends mederc, In the article that you read this time with the title Infection Monkey V1.6 - An Automated Pentest Tool, We have prepared this article well for you to read and retrieve information from it. hopefully fill the posts
Article Exploits,
Article Infection Monkey,
Article Linux,
Article Penetration Testing,
Article Pentest,
Article Security Automation,
Article Security Tools,
Article Server,
Article Testing, we write this you can understand. Alright, happy reading.
Title : Infection Monkey V1.6 - An Automated Pentest Tool
link : Infection Monkey V1.6 - An Automated Pentest Tool
The Infection Monkey is comprised of 2 parts:
Main Features
The Infection Monkey uses the next techniques in addition to exploits to propagate to other machines.
Setup
Check out the Setup page inwards the Wiki or a quick getting started guide.
Building the Monkey from source
If yous desire to construct the monkey from source, meet Setup in addition to follow the instructions at the readme files nether infection_monkey in addition to monkey_island.
You are now reading the article Infection Monkey V1.6 - An Automated Pentest Tool with the link address https://mederc.blogspot.com/2019/09/infection-monkey-v16-automated-pentest.html
Title : Infection Monkey V1.6 - An Automated Pentest Tool
link : Infection Monkey V1.6 - An Automated Pentest Tool
Infection Monkey V1.6 - An Automated Pentest Tool
The Infection Monkey is an opened upward source safety tool for testing a information center's resiliency to perimeter breaches in addition to internal server infection. The Monkey uses diverse methods to self-propagate across a information oculus in addition to reports success to a centralized Monkey Island server.
The Infection Monkey is comprised of 2 parts:
- Monkey - H5N1 tool which infects other machines in addition to propagates to them
- Monkey Island - H5N1 dedicated server to command in addition to visualize the Infection Monkey's progress within the information center
Main Features
The Infection Monkey uses the next techniques in addition to exploits to propagate to other machines.
- Multiple propagation techniques:
- Predefined passwords
- Common logical exploits
- Password stealing using Mimikatz
- Multiple exploit methods:
- SSH
- SMB
- RDP
- WMI
- Shellshock
- Conficker
- SambaCry
- Elastic Search (CVE-2015-1427)
Setup
Check out the Setup page inwards the Wiki or a quick getting started guide.
Building the Monkey from source
If yous desire to construct the monkey from source, meet Setup in addition to follow the instructions at the readme files nether infection_monkey in addition to monkey_island.
Thus the article Infection Monkey V1.6 - An Automated Pentest Tool
That's all the article Infection Monkey V1.6 - An Automated Pentest Tool this time, hopefully can benefit you all. okay, see you in another article posting.
You are now reading the article Infection Monkey V1.6 - An Automated Pentest Tool with the link address https://mederc.blogspot.com/2019/09/infection-monkey-v16-automated-pentest.html