Test Your ATT&CK
Before the Attack
Simulate an automated APT Attack for attack
evaluation and mitigation
Organizations are always looking for ways to get a better grip on what techniques adversaries are using and how to ensure the right mitigations are in place. Even when using the MITRE ATT&CK framework, the most definitive resource of hacker techniques available today, they often lack the expertise and resources required to put this threat theory into place. Some of the challenges they´re facing with include:
Test network defenses
Security teams can quickly and safely test network defenses and understand how they map to specific advanced persistent threats.
Get ATT&CK Analysis Report
The MITRE ATT&CK report maps the Infection Monkey attack results to the MITRE ATT&CK framework, allowing users to quickly discover internal vulnerabilities and rapidly fix them.
Works on every environment
Discover security gaps across all environments – bare metal, public and private clouds and even containers.
Don´t wait for an audit!
Don´t wait for an audit! Test your network on a regular basis against MITRE techniques and get the info you need on each technique to prepare for the next attack.
How it works
the MITRE ATT&CK knowledge base and then provide a report that:
For more information
What MITRE ATT&CK techniques the Infection Monkey uses?
The MITRE ATT&CK matrix consists of tactics and techniques. Tactics represent the “why” – What objective did the attacker try to achieve with a specific attack method? Each tactic consists of an array of techniques that represent the “how” – how the attackers implemented the specific tactic?.
An example of a tactic is Privilege Escalation. One of its techniques is Process Injection, referring to how a bad actor is using process injection to escalate privileges.