Infection Monkey
Data center Security Testing Tool
Infection Monkey - An automated pentest tool
The Infection Monkey is an open source security tool for testing a data center’s resiliency to perimeter breaches and internal server infection.
The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.
The Infection Monkey is comprised of two parts:
- Monkey - A tool which infects other machines and propagates to them
- Monkey Island - A dedicated server to control and visualize the Infection Monkey’s progress inside the data center
To read more about the Monkey, visit infectionmonkey.com
Main Features
The Infection Monkey uses the following techniques and exploits to propagate to other machines.
- Multiple propagation techniques:
- Predefined passwords
- Common logical exploits
- Password stealing using Mimikatz
- Multiple exploit methods:
- SSH
- SMB
- RDP
- WMI
- Shellshock
- Conficker
- SambaCry
- Elastic Search (CVE-2015-1427)
Setup
Check out the Setup page in the Wiki or a quick getting started guide.
Requirements
The Monkey Island server has been tested on Ubuntu 14.04,15.04 and 16.04 and Windows Server 2012.
The Monkey itself has been tested on Windows XP, 7, 8.1 and 10. The Linux build has been tested on Ubuntu server and Debian (multiple versions).
Installation
For off-the-shelf use, download a Debian package from our website and follow the guide, or you can download a specific release from Github.
Compile it yourself
To manually set up and the Monkey Island server follow the instructions on Monkey Island readme. If you wish to compile the binaries yourself, follow the instructions under the Infection Monkey readme.
Start Infecting
After installing the Infection Monkey on a server of your choice, just browse https://your-server-ip:5000 and follow the instructions to start infecting.