{"id":33259,"date":"2020-02-11T11:00:00","date_gmt":"2020-02-11T11:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/"},"modified":"2020-02-11T11:00:00","modified_gmt":"2020-02-11T11:00:00","slug":"release-the-monkey-how-infection-monkey-tests-network-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/","title":{"rendered":"Release the monkey! How Infection Monkey tests network security"},"content":{"rendered":"<div readability=\"75.077435470441\">\n<p>Companies these days spend millions on cybersecurity defenses to protect their networks. The average enterprise is bristling with every kind of protection platform available. And yet, breaches are still happening, and are even on the rise.<\/p>\n<p>Once a breach occurs, the long process of fixing the problem and figuring out why it happened begins. Perhaps the defensive platform had some vulnerabilities or wasn\u2019t installed correctly. Maybe there was a network configuration error that allowed an attacker to pass through undetected or a valid user had their credentials compromised. Whatever the reason, finding out after the fact can be a painful and expensive process, and that\u2019s not even accounting for whatever damage the attacker did while they had access to the network.<\/p>\n<p>In a perfect world, finding those vulnerabilities and cybersecurity shortcomings before a breach would be ideal. This could be accomplished with either human penetration testing or automated breach simulation tools. But both options can be expensive, and companies might be reluctant to invest the time and money into a tool or effort that might or might not bear fruit.<\/p>\n<p>GuardiCore has created another option. You might know Guardicore from a <a href=\"https:\/\/www.csoonline.com\/article\/3233946\/guardicore-centra-provides-visibility-protection-through-advanced-micro-segmentation.html\">review CSO conducted<\/a> of the GuardiCore Centra product back in 2017 when micro segmentation was just beginning to take off in cybersecurity. GuardiCore has always been a pioneer in the micro segmentation field, and today the company is leading the charge in the implementation of <a href=\"https:\/\/www.csoonline.com\/article\/3247848\/what-is-zero-trust-a-model-for-more-effective-security.html\">zero trust<\/a> networking, which is an offshoot of the segmentation concept. Initially, GuardiCore was working on a new product that would enable them to test their own security platforms, but instead decided to a free, open source tool that anyone could use to get a detailed look at their own network, regardless of its composition or what security tools they were using.<\/p>\n<p>Infection Monkey was born from that effort. The Infection Monkey program is available for download from <a href=\"https:\/\/www.guardicore.com\/infectionmonkey\/\">https:\/\/www.guardicore.com\/infectionmonkey\/<\/a> and the source code can be found, also for free, on GitHub. Anyone is free to modify the code if they want for their own purposes.<\/p>\n<p><a class=\"zoom\" href=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/1-infection-monkey-download-100829159-orig.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/1-infection-monkey-download-100829159-medium.jpg\" border=\"0\" alt=\"Infection Monkey Download\" width=\"300\" height=\"161\" data-imageid=\"100829159\" data-license=\"IDG\"><\/a> <small class=\"credit\">CSO<\/small><\/p>\n<p>The Infection Monkey program is available as a free download from <a href=\"https:\/\/www.guardicore.com\/infectionmonkey\/\">https:\/\/www.guardicore.com\/infectionmonkey\/<\/a> and the Python-based source code can be found, also for free, on GitHub.<\/p>\n<p>At its core, Infection Monkey is a <a href=\"https:\/\/www.csoonline.com\/article\/2943524\/penetration-testing-tools-the-pros-use.html\">penetration testing<\/a> tool. It\u2019s loaded with lots of advanced exploits as well as the ability to check for common security mistakes like weak passwords. It can be deployed to hunt for general cybersecurity issues, but also recently got the capability to examine whether zero-trust networking is configured correctly in enterprises that have implemented it.<\/p>\n<p>It\u2019s available for Windows, Linux, OpenStack, vSphere, Amazon Web Services, Azure, and Google Cloud Platform networks. And because the Python-based source code is also provided, users can configure it to work in proprietary or unique environments.<\/p>\n<p>For our evaluation, Infection Monkey was downloaded onto a virtualized network consisting of several clients, a database server, a load balancer and a few web servers. The client where the program is based is designated Monkey Island by the platform and acts as the host for the user interface. Infection Monkey can be run right away using its default settings, but is also highly configurable. You can control exactly what exploits the platform should try and use, what assets it should attack or avoid, or simply let the monkey run wild and try to find any and all exploitable paths in the target network, just like a hacker.<\/p>\n<\/div>\n<div readability=\"146.39307931571\">\n<p>Companies these days spend millions on cybersecurity defenses to protect their networks. The average enterprise is bristling with every kind of protection platform available. And yet, breaches are still happening, and are even on the rise.<\/p>\n<p>Once a breach occurs, the long process of fixing the problem and figuring out why it happened begins. Perhaps the defensive platform had some vulnerabilities or wasn\u2019t installed correctly. Maybe there was a network configuration error that allowed an attacker to pass through undetected or a valid user had their credentials compromised. Whatever the reason, finding out after the fact can be a painful and expensive process, and that\u2019s not even accounting for whatever damage the attacker did while they had access to the network.<\/p>\n<p>In a perfect world, finding those vulnerabilities and cybersecurity shortcomings before a breach would be ideal. This could be accomplished with either human penetration testing or automated breach simulation tools. But both options can be expensive, and companies might be reluctant to invest the time and money into a tool or effort that might or might not bear fruit.<\/p>\n<p>GuardiCore has created another option. You might know Guardicore from a <a href=\"https:\/\/www.csoonline.com\/article\/3233946\/guardicore-centra-provides-visibility-protection-through-advanced-micro-segmentation.html\">review CSO conducted<\/a> of the GuardiCore Centra product back in 2017 when micro segmentation was just beginning to take off in cybersecurity. GuardiCore has always been a pioneer in the micro segmentation field, and today the company is leading the charge in the implementation of <a href=\"https:\/\/www.csoonline.com\/article\/3247848\/what-is-zero-trust-a-model-for-more-effective-security.html\">zero trust<\/a> networking, which is an offshoot of the segmentation concept. Initially, GuardiCore was working on a new product that would enable them to test their own security platforms, but instead decided to a free, open source tool that anyone could use to get a detailed look at their own network, regardless of its composition or what security tools they were using.<\/p>\n<p>Infection Monkey was born from that effort. The Infection Monkey program is available for download from <a href=\"https:\/\/www.guardicore.com\/infectionmonkey\/\" rel=\"nofollow\">https:\/\/www.guardicore.com\/infectionmonkey\/<\/a> and the source code can be found, also for free, on GitHub. Anyone is free to modify the code if they want for their own purposes.<\/p>\n<p><a class=\"zoom\" href=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/1-infection-monkey-download-100829159-orig.jpg\" rel=\"nofollow\"><img border=\"0\" alt=\"Infection Monkey Download\" width=\"300\" height=\"161\" data-imageid=\"100829159\" data-license=\"IDG\" data-original=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/1-infection-monkey-download-100829159-medium.jpg\" class=\"lazy\" loading=\"lazy\"><\/a> <small class=\"credit\">CSO<\/small><\/p>\n<p>The Infection Monkey program is available as a free download from <a href=\"https:\/\/www.guardicore.com\/infectionmonkey\/\" rel=\"nofollow\">https:\/\/www.guardicore.com\/infectionmonkey\/<\/a> and the Python-based source code can be found, also for free, on GitHub.<\/p>\n<p>At its core, Infection Monkey is a <a href=\"https:\/\/www.csoonline.com\/article\/2943524\/penetration-testing-tools-the-pros-use.html\">penetration testing<\/a> tool. It\u2019s loaded with lots of advanced exploits as well as the ability to check for common security mistakes like weak passwords. It can be deployed to hunt for general cybersecurity issues, but also recently got the ability to examine whether zero-trust networking is configured correctly in enterprises that have implemented it.<\/p>\n<p>It\u2019s available for Windows, Linux, OpenStack, vSphere, Amazon Web Services, Azure, and Google Cloud Platform networks. And because the Python-based source code is also provided, users can configure it to work in proprietary or unique environments.<\/p>\n<p>For our evaluation, Infection Monkey was downloaded onto a virtualized network consisting of several clients, a database server, a load balancer and a few web servers. The client where the program is based is designated Monkey Island by the platform and acts as the host for the user interface. Infection Monkey can be run right away using its default settings, but is also highly configurable. You can control exactly what exploits the platform should try and use, what assets it should attack or avoid, or simply let the monkey run wild and try to find any and all exploitable paths in the target network, just like a hacker.<\/p>\n<p><a class=\"zoom\" href=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/2-infection-monkey-configure-100829160-orig.jpg\" rel=\"nofollow\"><img border=\"0\" alt=\"Infection Monkey Configure\" width=\"300\" height=\"221\" data-imageid=\"100829160\" data-license=\"Supplied Art\" data-original=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/2-infection-monkey-configure-100829160-medium.jpg\" class=\"lazy\" loading=\"lazy\"><\/a> <small class=\"credit\">CSO<\/small><\/p>\n<p>Although Infection Monkey can be used right away, it\u2019s also possible to tightly control exactly what tests it performs, where it goes and places in the network that it should avoid.<\/p>\n<p>Infection Monkey uses real attacks and real techniques to try and exploit its way into a network, so this is not technically an attack simulation. The only difference between what the monkey does and what a real attacker would do is the fact that the monkey doesn\u2019t deliver any malicious payloads or steal any data. For example, the monkey might create a new user on a machine that it has compromised and then try to use that user\u2019s credentials to get farther into a network. But once the test is over, Infection Monkey cleans up after itself and removes any trace that it was there, other than within its detailed infection report.<\/p>\n<p>Depending on the size and type of network, running Infection Monkey can take anywhere from a few minutes to a few hours. The program is designed not to hog system resources or bog down network connectivity when it\u2019s running. Once finished, it generates a report with multiple levels of detail.<\/p>\n<p><a class=\"zoom\" href=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/3-infection-monkey-report-100829161-orig.jpg\" rel=\"nofollow\"><img border=\"0\" alt=\"Infection Monkey Report\" width=\"1200\" height=\"794\" data-imageid=\"100829161\" data-license=\"Supplied Art\" data-original=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/3-infection-monkey-report-100829161-large.jpg\" class=\"lazy\" loading=\"lazy\"><\/a> <small class=\"credit\">CSO<\/small><\/p>\n<p>Once the monkey runs across a network, a two tiered report is generated. The first part shows generalizations about what happened and is suitable for a boardroom type presentation.<\/p>\n<p>At the highest level, Infection Monkey shows how many systems failed security checks. This is indicated using the standard red, yellow and green color scheme found in most cybersecurity reports. More red means more problems. You can also look at specific aspects of the report, such as how well the tested network aligns with the zero trust extended framework of best practices.<\/p>\n<p>While the high-level report is good for getting an idea about the scope of the problem, the real meat for cybersecurity professionals comes in the deeper details. Infection Monkey is great about recording everything that it did while trying to compromise a network \u2014 things like how it was able to access critical assets from public areas, what exploits it found in existing defenses and what information it was able to access. This includes a full account of IP addresses and the paths the monkey took to get around existing defenses. Using this data, a skilled security team could close some of those loopholes and then run Infection Monkey again at a later time to check their work.<\/p>\n<p><a class=\"zoom\" href=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/4-infection-monkey-specific-100829162-orig.jpg\" rel=\"nofollow\"><img border=\"0\" alt=\"Infection Monkey Specific\" width=\"1200\" height=\"803\" data-imageid=\"100829162\" data-license=\"Supplied Art\" data-original=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/4-infection-monkey-specific-100829162-large.jpg\" class=\"lazy\" loading=\"lazy\"><\/a> <small class=\"credit\">CSO<\/small><\/p>\n<p>The second part of the Infection Monkey report shows an extremely detailed view of what assets were breached and how it happened. The report can also be read by machines for ingestion into other defensive tools.<\/p>\n<p>The report is also valuable because it shows what attacks were thwarted and why. For example, in one instance, it was not able to create a new user on a specific asset because the ability to do that had been removed from a server. In another case, it did create a new user, but then could not do anything about it because the zero trust networking infrastructure meant that the new user was not allowed to access any information. Armed with this report, network security teams could check to see if attacks are being blocked because of the way they have their network configured, due to infrastructure defenses like firewalls, or because they are running some kind of effective cybersecurity protection platform.<\/p>\n<p><a class=\"zoom\" href=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/5-infection-monkey-pass-why-100829163-orig.jpg\" rel=\"nofollow\"><img border=\"0\" alt=\"Infection Monkey Pass Why\" width=\"300\" height=\"185\" data-imageid=\"100829163\" data-license=\"Supplied Art\" data-original=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/5-infection-monkey-pass-why-100829163-medium.jpg\" class=\"lazy\" loading=\"lazy\"><\/a> <small class=\"credit\">CSO<\/small><\/p>\n<p>In addition to showing how some defenses failed, the program will also detail why other attacks were stopped. That way you can see if a valid defense is based on permissions, network configuration or active protections provided by a security tool.<\/p>\n<p>It\u2019s surprising to find an attack simulation platform this useful that is available for free, with the modifiable source code also provided. Adding the ability for Infection Monkey to check for zero trust networking issues is even more helpful, as this is a relatively new protection scheme that is difficult to implement correctly. As such, Infection Monkey could be used to access overall security as a starting point to making improvements, or as a way to check existing defenses to ensure they are operating as intended with no shortcomings or oversights.<\/p>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.idginsiderpro.com\/article\/3519490\/release-the-monkey-how-infection-monkey-tests-network-security.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33260,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[207,7780,1061,739,307],"class_list":["post-33259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-data-breach","tag-it-strategy","tag-network-security","tag-open-source","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Release the monkey! How Infection Monkey tests network security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Release the monkey! How Infection Monkey tests network security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-11T11:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/release-the-monkey-how-infection-monkey-tests-network-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/release-the-monkey-how-infection-monkey-tests-network-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/release-the-monkey-how-infection-monkey-tests-network-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Release the monkey! How Infection Monkey tests network security\",\"datePublished\":\"2020-02-11T11:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/release-the-monkey-how-infection-monkey-tests-network-security\\\/\"},\"wordCount\":1878,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/release-the-monkey-how-infection-monkey-tests-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/release-the-monkey-how-infection-monkey-tests-network-security.jpg\",\"keywords\":[\"data breach\",\"IT Strategy\",\"Network Security\",\"Open Source\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/release-the-monkey-how-infection-monkey-tests-network-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/release-the-monkey-how-infection-monkey-tests-network-security\\\/\",\"name\":\"Release the monkey! How Infection Monkey tests network security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/release-the-monkey-how-infection-monkey-tests-network-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/release-the-monkey-how-infection-monkey-tests-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/release-the-monkey-how-infection-monkey-tests-network-security.jpg\",\"datePublished\":\"2020-02-11T11:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/release-the-monkey-how-infection-monkey-tests-network-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/release-the-monkey-how-infection-monkey-tests-network-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/release-the-monkey-how-infection-monkey-tests-network-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/release-the-monkey-how-infection-monkey-tests-network-security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/release-the-monkey-how-infection-monkey-tests-network-security.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/release-the-monkey-how-infection-monkey-tests-network-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"data breach\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/data-breach\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release the monkey! How Infection Monkey tests network security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release the monkey! How Infection Monkey tests network security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/","og_locale":"en_US","og_type":"article","og_title":"Release the monkey! How Infection Monkey tests network security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-02-11T11:00:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/release-the-monkey-how-infection-monkey-tests-network-security.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Release the monkey! How Infection Monkey tests network security","datePublished":"2020-02-11T11:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/"},"wordCount":1878,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/release-the-monkey-how-infection-monkey-tests-network-security.jpg","keywords":["data breach","IT Strategy","Network Security","Open Source","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/","url":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/","name":"Release the monkey! How Infection Monkey tests network security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/release-the-monkey-how-infection-monkey-tests-network-security.jpg","datePublished":"2020-02-11T11:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/release-the-monkey-how-infection-monkey-tests-network-security.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/release-the-monkey-how-infection-monkey-tests-network-security.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/release-the-monkey-how-infection-monkey-tests-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"data breach","item":"https:\/\/www.threatshub.org\/blog\/tag\/data-breach\/"},{"@type":"ListItem","position":3,"name":"Release the monkey! How Infection Monkey tests network security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33259"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33259\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33260"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}