Skip to content
Daniel Goldberg edited this page Jan 20, 2018 · 11 revisions

The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Command and Control(C&C) server.

The Infection Monkey is comprised of two parts:

  • Monkey - A tool which infects other machines and propagates to them
  • Monkey Island - A C&C server with a dedicated UI to visualize the Chaos Monkey's progress inside the data center

To read more about the Monkey, visit http://infectionmonkey.com

Main Features

The Infection Monkey uses the following techniques and exploits to propagate to other machines.

  • Multiple propagation techniques:
    • Predefined passwords
    • Common logical exploits
    • Password stealing using mimikatz
  • Multiple exploit methods:
    • SSH
    • SMB
    • RDP
    • WMI
    • Shellshock
    • Conficker
    • SambaCry
    • Elastic Search (CVE-2015-1427)

Getting Started

Requirements

The C&C Server has been tested on Ubuntu 14.04,15.04 and 16.04 and 17.04. The Monkey itself has been tested on Windows XP, 7, 8.1 and 10. The Linux build has been tested on Ubuntu server (multiple versions).

Installation

For off-the-shelf use, download a Debian package from our website and follow the guide written in our blog. Warning! The Debian package will uninstall the python library 'bson' because of an issue with pymongo. You can reinstall it later, but monkey island will probably not work.

To manually set up and the C&C server follow the instructions on Monkey Island readme. If you wish to compile the binaries yourself, follow the instructions under Building the Monkey from Source.