
Sign up to save your podcasts
Or


Hey friends, today we talk through how to simulate ransomware (in a test environment!) using Infection Monkey. It's a cool way to show your team and execs just how quick and deadly an infection can be to your business. You can feed the monkey a list of usernames and passwords/hashes to use for lateral movement, test network segmentation, set a UNC path of files to actually encrypt (careful - run in a test lab - NOT in prod!) and more!
By Brian Johnson4.7
6868 ratings
Hey friends, today we talk through how to simulate ransomware (in a test environment!) using Infection Monkey. It's a cool way to show your team and execs just how quick and deadly an infection can be to your business. You can feed the monkey a list of usernames and passwords/hashes to use for lateral movement, test network segmentation, set a UNC path of files to actually encrypt (careful - run in a test lab - NOT in prod!) and more!

186 Listeners

2,013 Listeners

371 Listeners

372 Listeners

653 Listeners

1,026 Listeners

318 Listeners

418 Listeners

8,078 Listeners

176 Listeners

315 Listeners

196 Listeners

73 Listeners

138 Listeners

45 Listeners