The Infection Monkey maps its actions to the MITRE ATT&CK knowledge base. After simulating an advanced persistent threat (APT) attack, it generates a report summarizing the success of the techniques utilized along with recommended mitigation steps, helping you identify and mitigate attack paths in your environment.
Watch the overview video:
The MITRE ATT&CK report is centred around the ATT&CK matrix:
The Infection Monkey rates your network on the attack techniques it attempted, assigning one of the corresponding labels to each:
By clicking on each of the listed techniques, you can see exactly how the Infection Monkey used it and any recommended mitigation steps. For example, let’s look at the Brute Force technique that’s a part of employing the Credentials Access tactic:
In this example, you can see how the Infection Monkey was able to use an old
root password to access all machines in the network. When scrolling to the bottom of this list, you can also see the mitigation steps recommended, including reconfiguring your Account Use Policies and implementing Multi-factor Authentication.