23
Information Security Inc. Infection Monkey

Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Inc

Infection Monkey

Information Security Confidential - Partner Use Only

Contents

2

bull About Infection Monkey

bull Architecture

bull Requirements

bull Testing Setup

bull Installing Infection Monkey

bull Running Infection Monkey

bull References

Information Security Confidential - Partner Use Only

About Infection Monkey

3

bull The Infection Monkey is an open source security tool for testing a

data centers resiliency to perimeter breaches and internal server

infection

bull The Monkey uses various methods to self propagate across a data

center and reports success to a centralized Command and

Control(CampC) server

Information Security Confidential - Partner Use Only

Architecture

4

bull Monkey - A tool which infects other machines and propagates to

them

bull Monkey Island - A CampC server with a dedicated UI to visualize the

Chaos Monkeys progress inside the data center

Information Security Confidential - Partner Use Only

Architecture

5

bull The monkey is composed of three separate parts

bull The Infection Monkey itself - PyInstaller compressed python

archives

bull Sambacry binaries - Two linux binaries 3264 bit

bull Mimikatz binaries - Two windows binaries 3264 bit

Information Security Confidential - Partner Use Only

Requirements

6

bull The CampC Server has been tested on Ubuntu 14041504 and

1604

bull The Monkey itself has been tested on Windows XP 7 81 and 10

bull The Linux build has been tested on Ubuntu server (multiple

versions)

Information Security Confidential - Partner Use Only

Testing Setup

7

------------------

|Monkey |

| Kali |

| Linux | +++++++

-------------------

IP1921681012

----------------

| Browser | +++++++

| Edge |

| Windows10| ----------------------

---------------- +++++++++++++ | Ubuntu 1604 |

IP 19216810101 | Monkey |

| Island |

------------------IP 192168878

Information Security Confidential - Partner Use Only

Installing Infection Monkey

8

bull Installing the InfectionMonkey on Linux

bull Downloading Infection Monkey

Information Security Confidential - Partner Use Only

Installing Infection Monkey

9

bull Installing the InfectionMonkey on Linux

bull Unpacking the tarball

Information Security Confidential - Partner Use Only

Installing Infection Monkey

10

bull Installing the InfectionMonkey on Linux

bull Installing Flask-pymongo

Information Security Confidential - Partner Use Only

Installing Infection Monkey

11

bull Installing the Monkey on Linux

bull Installing the Monkey Island

Information Security Confidential - Partner Use Only

Installing Infection Monkey

12

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 2: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Contents

2

bull About Infection Monkey

bull Architecture

bull Requirements

bull Testing Setup

bull Installing Infection Monkey

bull Running Infection Monkey

bull References

Information Security Confidential - Partner Use Only

About Infection Monkey

3

bull The Infection Monkey is an open source security tool for testing a

data centers resiliency to perimeter breaches and internal server

infection

bull The Monkey uses various methods to self propagate across a data

center and reports success to a centralized Command and

Control(CampC) server

Information Security Confidential - Partner Use Only

Architecture

4

bull Monkey - A tool which infects other machines and propagates to

them

bull Monkey Island - A CampC server with a dedicated UI to visualize the

Chaos Monkeys progress inside the data center

Information Security Confidential - Partner Use Only

Architecture

5

bull The monkey is composed of three separate parts

bull The Infection Monkey itself - PyInstaller compressed python

archives

bull Sambacry binaries - Two linux binaries 3264 bit

bull Mimikatz binaries - Two windows binaries 3264 bit

Information Security Confidential - Partner Use Only

Requirements

6

bull The CampC Server has been tested on Ubuntu 14041504 and

1604

bull The Monkey itself has been tested on Windows XP 7 81 and 10

bull The Linux build has been tested on Ubuntu server (multiple

versions)

Information Security Confidential - Partner Use Only

Testing Setup

7

------------------

|Monkey |

| Kali |

| Linux | +++++++

-------------------

IP1921681012

----------------

| Browser | +++++++

| Edge |

| Windows10| ----------------------

---------------- +++++++++++++ | Ubuntu 1604 |

IP 19216810101 | Monkey |

| Island |

------------------IP 192168878

Information Security Confidential - Partner Use Only

Installing Infection Monkey

8

bull Installing the InfectionMonkey on Linux

bull Downloading Infection Monkey

Information Security Confidential - Partner Use Only

Installing Infection Monkey

9

bull Installing the InfectionMonkey on Linux

bull Unpacking the tarball

Information Security Confidential - Partner Use Only

Installing Infection Monkey

10

bull Installing the InfectionMonkey on Linux

bull Installing Flask-pymongo

Information Security Confidential - Partner Use Only

Installing Infection Monkey

11

bull Installing the Monkey on Linux

bull Installing the Monkey Island

Information Security Confidential - Partner Use Only

Installing Infection Monkey

12

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 3: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

About Infection Monkey

3

bull The Infection Monkey is an open source security tool for testing a

data centers resiliency to perimeter breaches and internal server

infection

bull The Monkey uses various methods to self propagate across a data

center and reports success to a centralized Command and

Control(CampC) server

Information Security Confidential - Partner Use Only

Architecture

4

bull Monkey - A tool which infects other machines and propagates to

them

bull Monkey Island - A CampC server with a dedicated UI to visualize the

Chaos Monkeys progress inside the data center

Information Security Confidential - Partner Use Only

Architecture

5

bull The monkey is composed of three separate parts

bull The Infection Monkey itself - PyInstaller compressed python

archives

bull Sambacry binaries - Two linux binaries 3264 bit

bull Mimikatz binaries - Two windows binaries 3264 bit

Information Security Confidential - Partner Use Only

Requirements

6

bull The CampC Server has been tested on Ubuntu 14041504 and

1604

bull The Monkey itself has been tested on Windows XP 7 81 and 10

bull The Linux build has been tested on Ubuntu server (multiple

versions)

Information Security Confidential - Partner Use Only

Testing Setup

7

------------------

|Monkey |

| Kali |

| Linux | +++++++

-------------------

IP1921681012

----------------

| Browser | +++++++

| Edge |

| Windows10| ----------------------

---------------- +++++++++++++ | Ubuntu 1604 |

IP 19216810101 | Monkey |

| Island |

------------------IP 192168878

Information Security Confidential - Partner Use Only

Installing Infection Monkey

8

bull Installing the InfectionMonkey on Linux

bull Downloading Infection Monkey

Information Security Confidential - Partner Use Only

Installing Infection Monkey

9

bull Installing the InfectionMonkey on Linux

bull Unpacking the tarball

Information Security Confidential - Partner Use Only

Installing Infection Monkey

10

bull Installing the InfectionMonkey on Linux

bull Installing Flask-pymongo

Information Security Confidential - Partner Use Only

Installing Infection Monkey

11

bull Installing the Monkey on Linux

bull Installing the Monkey Island

Information Security Confidential - Partner Use Only

Installing Infection Monkey

12

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 4: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Architecture

4

bull Monkey - A tool which infects other machines and propagates to

them

bull Monkey Island - A CampC server with a dedicated UI to visualize the

Chaos Monkeys progress inside the data center

Information Security Confidential - Partner Use Only

Architecture

5

bull The monkey is composed of three separate parts

bull The Infection Monkey itself - PyInstaller compressed python

archives

bull Sambacry binaries - Two linux binaries 3264 bit

bull Mimikatz binaries - Two windows binaries 3264 bit

Information Security Confidential - Partner Use Only

Requirements

6

bull The CampC Server has been tested on Ubuntu 14041504 and

1604

bull The Monkey itself has been tested on Windows XP 7 81 and 10

bull The Linux build has been tested on Ubuntu server (multiple

versions)

Information Security Confidential - Partner Use Only

Testing Setup

7

------------------

|Monkey |

| Kali |

| Linux | +++++++

-------------------

IP1921681012

----------------

| Browser | +++++++

| Edge |

| Windows10| ----------------------

---------------- +++++++++++++ | Ubuntu 1604 |

IP 19216810101 | Monkey |

| Island |

------------------IP 192168878

Information Security Confidential - Partner Use Only

Installing Infection Monkey

8

bull Installing the InfectionMonkey on Linux

bull Downloading Infection Monkey

Information Security Confidential - Partner Use Only

Installing Infection Monkey

9

bull Installing the InfectionMonkey on Linux

bull Unpacking the tarball

Information Security Confidential - Partner Use Only

Installing Infection Monkey

10

bull Installing the InfectionMonkey on Linux

bull Installing Flask-pymongo

Information Security Confidential - Partner Use Only

Installing Infection Monkey

11

bull Installing the Monkey on Linux

bull Installing the Monkey Island

Information Security Confidential - Partner Use Only

Installing Infection Monkey

12

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 5: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Architecture

5

bull The monkey is composed of three separate parts

bull The Infection Monkey itself - PyInstaller compressed python

archives

bull Sambacry binaries - Two linux binaries 3264 bit

bull Mimikatz binaries - Two windows binaries 3264 bit

Information Security Confidential - Partner Use Only

Requirements

6

bull The CampC Server has been tested on Ubuntu 14041504 and

1604

bull The Monkey itself has been tested on Windows XP 7 81 and 10

bull The Linux build has been tested on Ubuntu server (multiple

versions)

Information Security Confidential - Partner Use Only

Testing Setup

7

------------------

|Monkey |

| Kali |

| Linux | +++++++

-------------------

IP1921681012

----------------

| Browser | +++++++

| Edge |

| Windows10| ----------------------

---------------- +++++++++++++ | Ubuntu 1604 |

IP 19216810101 | Monkey |

| Island |

------------------IP 192168878

Information Security Confidential - Partner Use Only

Installing Infection Monkey

8

bull Installing the InfectionMonkey on Linux

bull Downloading Infection Monkey

Information Security Confidential - Partner Use Only

Installing Infection Monkey

9

bull Installing the InfectionMonkey on Linux

bull Unpacking the tarball

Information Security Confidential - Partner Use Only

Installing Infection Monkey

10

bull Installing the InfectionMonkey on Linux

bull Installing Flask-pymongo

Information Security Confidential - Partner Use Only

Installing Infection Monkey

11

bull Installing the Monkey on Linux

bull Installing the Monkey Island

Information Security Confidential - Partner Use Only

Installing Infection Monkey

12

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 6: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Requirements

6

bull The CampC Server has been tested on Ubuntu 14041504 and

1604

bull The Monkey itself has been tested on Windows XP 7 81 and 10

bull The Linux build has been tested on Ubuntu server (multiple

versions)

Information Security Confidential - Partner Use Only

Testing Setup

7

------------------

|Monkey |

| Kali |

| Linux | +++++++

-------------------

IP1921681012

----------------

| Browser | +++++++

| Edge |

| Windows10| ----------------------

---------------- +++++++++++++ | Ubuntu 1604 |

IP 19216810101 | Monkey |

| Island |

------------------IP 192168878

Information Security Confidential - Partner Use Only

Installing Infection Monkey

8

bull Installing the InfectionMonkey on Linux

bull Downloading Infection Monkey

Information Security Confidential - Partner Use Only

Installing Infection Monkey

9

bull Installing the InfectionMonkey on Linux

bull Unpacking the tarball

Information Security Confidential - Partner Use Only

Installing Infection Monkey

10

bull Installing the InfectionMonkey on Linux

bull Installing Flask-pymongo

Information Security Confidential - Partner Use Only

Installing Infection Monkey

11

bull Installing the Monkey on Linux

bull Installing the Monkey Island

Information Security Confidential - Partner Use Only

Installing Infection Monkey

12

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 7: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Testing Setup

7

------------------

|Monkey |

| Kali |

| Linux | +++++++

-------------------

IP1921681012

----------------

| Browser | +++++++

| Edge |

| Windows10| ----------------------

---------------- +++++++++++++ | Ubuntu 1604 |

IP 19216810101 | Monkey |

| Island |

------------------IP 192168878

Information Security Confidential - Partner Use Only

Installing Infection Monkey

8

bull Installing the InfectionMonkey on Linux

bull Downloading Infection Monkey

Information Security Confidential - Partner Use Only

Installing Infection Monkey

9

bull Installing the InfectionMonkey on Linux

bull Unpacking the tarball

Information Security Confidential - Partner Use Only

Installing Infection Monkey

10

bull Installing the InfectionMonkey on Linux

bull Installing Flask-pymongo

Information Security Confidential - Partner Use Only

Installing Infection Monkey

11

bull Installing the Monkey on Linux

bull Installing the Monkey Island

Information Security Confidential - Partner Use Only

Installing Infection Monkey

12

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 8: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Installing Infection Monkey

8

bull Installing the InfectionMonkey on Linux

bull Downloading Infection Monkey

Information Security Confidential - Partner Use Only

Installing Infection Monkey

9

bull Installing the InfectionMonkey on Linux

bull Unpacking the tarball

Information Security Confidential - Partner Use Only

Installing Infection Monkey

10

bull Installing the InfectionMonkey on Linux

bull Installing Flask-pymongo

Information Security Confidential - Partner Use Only

Installing Infection Monkey

11

bull Installing the Monkey on Linux

bull Installing the Monkey Island

Information Security Confidential - Partner Use Only

Installing Infection Monkey

12

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 9: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Installing Infection Monkey

9

bull Installing the InfectionMonkey on Linux

bull Unpacking the tarball

Information Security Confidential - Partner Use Only

Installing Infection Monkey

10

bull Installing the InfectionMonkey on Linux

bull Installing Flask-pymongo

Information Security Confidential - Partner Use Only

Installing Infection Monkey

11

bull Installing the Monkey on Linux

bull Installing the Monkey Island

Information Security Confidential - Partner Use Only

Installing Infection Monkey

12

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 10: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Installing Infection Monkey

10

bull Installing the InfectionMonkey on Linux

bull Installing Flask-pymongo

Information Security Confidential - Partner Use Only

Installing Infection Monkey

11

bull Installing the Monkey on Linux

bull Installing the Monkey Island

Information Security Confidential - Partner Use Only

Installing Infection Monkey

12

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 11: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Installing Infection Monkey

11

bull Installing the Monkey on Linux

bull Installing the Monkey Island

Information Security Confidential - Partner Use Only

Installing Infection Monkey

12

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 12: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Installing Infection Monkey

12

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 13: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Installing Infection Monkey

13

bull Installing the Monkey on Linux

bull Verify the Monkey service is functional

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 14: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Installing Infection Monkey

14

bull Access the Monkeyrsquos Island GUI by browsing to

https1921688785000adminindexhtml

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 15: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Running Infection Monkey

15

bull The Monkey can be run in two ways =gt

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 16: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Running Infection Monkey

16

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 17: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Running Infection Monkey

17

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 18: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Running Infection Monkey

18

1) With the Monkey Island as the initial attacker This will use the

Monkey Island server as a starting position for the Monkey from

which it will expand based on the configuration

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 19: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Running Infection Monkey

19

2) Running the Monkey from a machine elsewhere network

Download the appropriate Monkey executable (LinuxWindows and

matching 3264 bitness) using the following path

https1921688785000apimonkeydownload[binaryToDownload]

(monkey-windows-32exe monkey-windows-64exe monkey-linux-

32 monkey-linux-64)

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 20: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Running Infection Monkey

20

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 21: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Running Infection Monkey

21

bull Execute the Monkey from the console passing the server address

as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 22: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

Running Infection Monkey

22

bull 2) Execute the Monkey from the console passing the server

address as a parameter and the magic keyword for execution

bull Example ldquomonkey-linux-64 m0nk3y -s 1921688785000rdquo

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey

Page 23: Infection Monkey - 情報セキュリティ株式会社 · About Infection Monkey 3 •The Infection Monkey is an open source security tool for testing a data center's resiliency

Information Security Confidential - Partner Use Only

References

23

bull Official website

httpswwwguardicorecominfectionmonkey

bull Github

httpsgithubcomguardicoremonkey