
Sign up to save your podcasts
Or


Hey friends, today we talk through how to simulate ransomware (in a test environment!) using Infection Monkey. It's a cool way to show your team and execs just how quick and deadly an infection can be to your business. You can feed the monkey a list of usernames and passwords/hashes to use for lateral movement, test network segmentation, set a UNC path of files to actually encrypt (careful - run in a test lab - NOT in prod!) and more!
By Brian Johnson4.7
6868 ratings
Hey friends, today we talk through how to simulate ransomware (in a test environment!) using Infection Monkey. It's a cool way to show your team and execs just how quick and deadly an infection can be to your business. You can feed the monkey a list of usernames and passwords/hashes to use for lateral movement, test network segmentation, set a UNC path of files to actually encrypt (careful - run in a test lab - NOT in prod!) and more!

186 Listeners

2,007 Listeners

372 Listeners

371 Listeners

651 Listeners

1,020 Listeners

319 Listeners

416 Listeners

8,064 Listeners

179 Listeners

315 Listeners

189 Listeners

74 Listeners

139 Listeners

44 Listeners