Security News > 2020 > April > New Version of Infection Monkey Maps to MITRE ATT&CK Framework
Guardicore's open source breach and attack simulation platform Infection Monkey now maps its attack results to the MITRE ATT&CK framework, allowing users to quickly discover internal vulnerabilities and rapidly fix them.
Infection Monkey operates within organizations' existing environments, whether cloud, on prem, hypervisors or containers, and finds and maps lateral movement paths through the environment using real world exploits.
The latest version now released maps the Monkey's findings to the MITRE ATT&CK framework, providing an ATT&CK status report that delivers all the information on each successful exploit attack to allow users to prepare for the next stage in a potential real attack.
The existing version of Infection Monkey allows security teams to see how their network can be traversed and by what methods.
The types of attack used by Monkey can even be configured via the MITRE ATT&CK report - so if 'pass the hash' testing is not required, it can be turned off via the ATT&CK framework.