• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Infection Monkey v2.0 - An automated pentest tool

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,618
Solutions
2
Reputation
32
Reaction score
100,455
Points
2,313
Credits
32,700
‎6 Years of Service‎
 
76%
map-full.png


The Infection Monkey is an open-source security tool for testing a data center’s resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self-propagate across a data center and reports success to a centralized Command and Control(C&C) server.

Main Features

The Infection Monkey uses the following techniques and exploits to propagate to other machines.

    Multiple propagation techniques:
        Predefined passwords
        Common logical exploits
        Password stealing using mimikatz

    Multiple exploit methods:
        SSH
        SMB
        RDP
        WMI
        Shellshock
        Conficker
        SambaCry
        Elastic Search (CVE-2015-1427)

Changelog v2.0
Added


    credentials.json file for storing Monkey Island user login information. #1206
    GET /api/propagation-credentials/<string:guid> endpoint for agents to retrieve updated credentials from the Island. #1538
    GET /api/island/ip-addresses endpoint to get IP addresses of the Island server network interfaces. #1996
    SSHCollector as a configurable System info Collector. #1606
    deployment_scrips/install-infection-monkey-service.sh to install an AppImage as a service. #1552
    The ability to download the Monkey Island logs from the Infection Map page. #1640
    POST /api/reset-agent-configuration endpoint. #2036
    POST /api/clear-simulation-data endpoint. #2036
    GET /api/registration-status endpoint. #2149
    Authentication to /api/island/version. #2109
    The ability to customize the file extension used by the ransomware payload when encrypting files. #1242
    {GET,POST} /api/agents endpoint. #2362
    GET /api/agent-signals endpoint. #2261
    GET /api/agent-logs/<uuid:agent_id> endpoint. #2274
    GET /api/machines endpoint. #2362
    {GET,POST} /api/agent-events endpoints. #2405
    GET /api/nodes endpoint. #2155, #2300, #2334
    Scrollbar to preview pane’s exploit timeline in the map page. #2455
    GET /api/agent-plugins/<string:os>/<string:type>/<string:name> endpoint. #2578, #2811
    GET /api/agent-configuration-schema endpoint. #2710
    GET /api/agent-plugins/<string:type>/<string:name>/manifest endpoint. #2786
    GET /api/agent-binaries/<string:os> endpoint. #1675, #1978
    More…


To see this hidden content, you must like this content.
 
Last edited by a moderator:
Status
Not open for further replies.
Back
Top