Israeli cybersecurity startup GuardiCore Ltd. today announced a significant update to its free, open-source security penetration testing tool Infection Monkey, which is used to simulate attacks on data center infrastructure.
Introduced in 2016, Infection Monkey is a “self-propagating” testing tool that information technology teams can use to find weakness in their on-premises and cloud-based data centers.
The tool works by scanning the network for open ports and fingerprinting machines using multiple network protocols. Once it finds a vulnerability in the network, it attacks it using a variety of methods, including password guessing, by drawing on data on the systems it has breached, such as user credentials. Infection Monkey then tries to infect as many machines in the system as possible, in order to highlight how vulnerable they are.
The tool is designed to complement GuardiCore’s deception-based security platform Centra, which works by rerouting suspicious connections to a sandbox where the attacker is allowed to carry out the actions intended against the original target, so that IT teams can learn more about individual threats.
“While traditional testing tools and services offer in-depth, specific assessments of network vulnerabilities, Infection Monkey provides a safe means to conduct continuous testing, giving security professionals a very clear picture of any vulnerability in real time and what to do to fix them,” said Ofri Ziv, head of Guardicore Labs.
Infection Monkey is gaining some new features with its 1.5 release. The most compelling updates are its enhanced platform support, which makes the tool much more useful for enterprises running modern IT environments. The latest version now includes support for the Amazon Web Services, Microsoft Azure and Google Cloud Platform public clouds, as well as Docker containers, which are used by developers to build software applications that can run on