Infection Monkey - Adversary Emulation
π **Infection Monkey Adversary Simulation β Realistic Network Breach Demo** π In this video, I walk through a practical demo using Infection Monkey β a powerful open-source breach and attack simulation tool β to show how an attacker could infiltrate a corporate network. We simulate an external Command & Control (C2) server using Monkey Island, positioned outside the perimeter firewall, mimicking a real-world Internet-based threat actor. From there, youβll see how internal machines in the corporate LAN become infected, call back to the C2 server, and begin probing adjacent nodes for vulnerabilities β exactly how lateral movement works in an actual attack scenario. **You'll also see:** * How Infection Monkey maps out its path of compromise * Lateral movement between infected Windows and server machines * Attempted pivots to hidden subnets * Insights gathered from compromised nodes * The value this tool brings to red teaming and internal security assessments Whether you're into offensive security, blue team defense, or just curious about how modern adversaries move through networks, this demo has something for you. π§ **Tools Used:** * Infection Monkey * Virtualized test environment * Simulated Internet/C2 architecture π Like, comment, and subscribe if this helped or sparked your curiosity. π¬ Got questions or want to share your thoughts? Drop them in the comments!
Download
0 formatsNo download links available.