The Infection Monkey uses the following techniques and to propagate to other machines.
- Multiple propagation techniques:
- Predefined passwords
- Common logical exploits
- Password stealing using Mimikatz
- Multiple exploit methods:
- Elastic Search (CVE-2020-1427)
Check out the page in the Wiki or a quick getting .
Building the Monkey from source
If you want to build the monkey from source, see and follow the instructions at the readme files under and .