Use cases

This section describes possible use cases for the Infection Monkey and helps to understand how this tool can be configured. You can also refer to our FAQ for more specific questions and answers.

No worries! The Monkey uses safe exploiters and does not cause any permanent system modifications that impact security or operations.

Section contents

  • Network Breach
  • Simulate an internal network breach and assess the potential impact.

  • Network Segmentation
  • Test network segmentation policies for apps that need ringfencing or tiers that require microsegmentation.

  • Credential Leak
  • Assess the impact of successful phishing attack, insider threat, or other form of credentials leak.

  • IDS/IPS Test
  • Test your network defence solutions.

  • Other
  • Tips and tricks about configuring monkey for your needs.