If you haven’t deployed the Monkey Island yet, please refer to our setup documentation .
After deploying the Monkey Island in your environment, navigate to
On your first login, you’ll be asked to create a username and password for the Monkey Island server. See this page for more details .
To get the Infection Monkey running as fast as possible, click Run Monkey. Optionally, you can configure the Infection Monkey before you continue by clicking on Configuration (see how to configure the Infection Monkey ).
To run the Infection Monkey, select one of the following options:
If you’re running the Infection Monkey in an AWS cloud environment, check out Usage -> Integrations for information about how it integrates with AWS.
Next, click Infection Map to see the Infection Monkey in action.
At first, the infection map will look like this:
Within a few minutes, the Infection Monkey should be able to find and attack accessible machines.
As the simulation continues, the Infection Monkey will fill in the map with data on accessible and “hacked” machines. Once all the Infection Monkeys have finished propagating, click Reports to see the reports. See Infection Monkey Reports for more info.
Congratulations, you finished your first successful execution of the Infection Monkey 🎉 ! To thoroughly test your network, you can run the Infection Monkey from different starting locations and use different configurations.