Description
Have you tested your network using a breach and attack simulator? If not, Jack Wallen shows you how with Infection Monkey.
Summary
- Your business probably uses quite a large number of systems on your network and you are probably the administrator who maintains those systems.
- In the resulting window, select the type of machine you'll be testing (Figure D).
- Copy that command and then paste it into a terminal on the machine to be tested.
- How to install Infection Monkey for breach and attack simulations on your network By Jack Wallen Jack Wallen is an award-winning writer for TechRepublic, The New Stack, and Linux New Media.