Main Features
The Infection Monkey uses the following techniques and exploits to propagate to other machines.
Multiple propagation techniques:
Predefined passwords
Common logical exploits
Password stealing using Mimikatz
Multiple exploit methods:
SSH
SMB
WMI
Log4Shell
Zerologon
***...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.