MITRE ATT&CK

Test Your ATT&CK
Before the Attack

Simulate an automated APT Attack for attack
evaluation and mitigation

The Challenge

Organizations are always looking for ways to get a better grip on what techniques adversaries are using and how to ensure the right mitigations are in place. Even when using the MITRE ATT&CK framework, the most definitive resource of hacker techniques available today, they often lack the expertise and resources required to put this threat theory into place. Some of the challenges they´re facing with include:

Key Benefits

Test network defenses

Security teams can quickly and safely test network defenses and understand how they map to specific advanced persistent threats.

Get ATT&CK Analysis Report

The MITRE ATT&CK report maps the Infection Monkey attack results to the MITRE ATT&CK framework, allowing users to quickly discover internal vulnerabilities and rapidly fix them.

Works on every environment

Discover security gaps across all environments – bare metal, public and private clouds and even containers.

Don´t wait for an audit!

Don´t wait for an audit! Test your network on a regular basis against MITRE techniques and get the info you need on each technique to prepare for the next attack.

Features

How it works

The Guardicore Infection Monkey simulates attacks using tactics and techniques listed on 
the MITRE ATT&CK knowledge base and then provide a report that:

For more information

Supported Platforms:

What MITRE ATT&CK techniques the Infection Monkey uses?

The MITRE ATT&CK matrix consists of tactics and techniques. Tactics represent the “why” – What objective did the attacker try to achieve with a specific attack method? Each tactic consists of an array of techniques that represent the “how” – how the attackers implemented the specific tactic?.

An example of a tactic is Privilege Escalation. One of its techniques is Process Injection, referring to how a bad actor is using process injection to escalate privileges.

Learn More about the Infection Monkey

Explore the Zero Trust Analysis Report.

Evaluate your Zero Trust gaps against the Forrester ZTX framework.

Explore Breach and Attack simulation Capabilities

Find weaknesses in on-premises and cloud-based data centers.

Download the Infection Monkey

To download the Infection Monkey, please submit the form below and we will e-mail you the link.

About Guardicore Labs

The Infection Monkey is developed and maintained by Guardicore Labs, the Guardicore global research team, consisting of hackers, cybersecurity researchers and industry experts. Our mission is to deliver cutting-edge cyber security research and provide analysis, insights and response methodologies to latest cyber threats. We help Guardicore customers and the security community to continually enhance their security posture and protect critical business applications and infrastructure.