{"id":19919,"date":"2021-02-03T20:21:27","date_gmt":"2021-02-03T14:51:27","guid":{"rendered":"https:\/\/valeurbit.com\/blog\/?p=19919"},"modified":"2021-02-12T17:57:19","modified_gmt":"2021-02-12T12:27:19","slug":"how-to-check-ips-infection-monkey-vs-check-point","status":"publish","type":"post","link":"https:\/\/valeurbit.com\/blog\/how-to-check-ips-infection-monkey-vs-check-point\/","title":{"rendered":"How To Check IPS? Infection Monkey vs Check Point"},"content":{"rendered":"\n<p>Three years ago we published an article \u201c&nbsp;Online tools for the simplest Pentest&nbsp;\u201d.&nbsp;There we talked about affordable and quick ways to check the protection of your network perimeter using tools such as&nbsp;Check Point CheckMe&nbsp;,&nbsp;Fortinet Test Your Metal&nbsp;, etc.&nbsp;But sometimes a more serious test is required when you want to &#8220;make noise&#8221; already inside the network (and preferably safe for the infrastructure).&nbsp;A free tool like&nbsp;Infection Monkey&nbsp;can be very useful for this purpose&nbsp;.&nbsp;For example, we decided to scan the network through the Check Point gateway and see what the IPS sees.&nbsp;Although nothing prevents you from conducting a similar experiment with other solutions to check how your IPS system or NGFW works.&nbsp;Results under the cut.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Infection Monkey<\/h2>\n\n\n\n<p>This tool can be classified as BAS (Breach and Attack Simulation) systems that allow you to assess the security of your network in an automatic mode.&nbsp;At the same time, a secure &#8220;penetration test&#8221; of your infrastructure is performed.&nbsp;The tool is open source and actively developed.&nbsp;Probably its main difference is that all tests pass inside your network, as if an attacker has already penetrated you.&nbsp;The majority are still focusing on perimeter protection, while forgetting about the need for other measures.&nbsp;The same IDS \/ IPS is very important for complex protection, since&nbsp;allows you to identify threats that are already inside the network.&nbsp;Infection Monkey&nbsp;is a good way to assess the maturity of information security in your company.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Supported platforms<\/h4>\n\n\n\n<p>Infection Monkey itself can be deployed as a virtual machine.&nbsp;The following platforms are supported:<\/p>\n\n\n\n<ul><li>VMware<\/li><li>Hyper-V<\/li><li>AWS<\/li><li>Docker<\/li><li>Azure<\/li><li>Google cloud platform<\/li><\/ul>\n\n\n\n<p>AWS has a&nbsp;pre-built template&nbsp;that you can use with your free account.&nbsp;We use ESXi most often.&nbsp;The image can be requested at the&nbsp;office.&nbsp;website&nbsp;, or&nbsp;with us&nbsp;.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Installation<\/h4>\n\n\n\n<p>The installation itself is extremely simple and is described&nbsp;here&nbsp;, I see no reason to duplicate this information.&nbsp;There is also an instruction for starting the check.&nbsp;We&#8217;d better focus on the test results.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Attack techniques used<\/h4>\n\n\n\n<p>Infection Monkey uses several attack vectors and allows you to see the following things:<\/p>\n\n\n\n<p><strong>1) Vulnerable hosts<\/strong>&nbsp;.&nbsp;Finds hosts with weak passwords, old software versions, or known vulnerabilities.&nbsp;Here is a list of onboard exploits:<\/p>\n\n\n\n<ul><li>SMB Exploiter<\/li><li>WMI Exploiter<\/li><li>MSSQL Exploiter<\/li><li>MS08-067 Exploiter<\/li><li>SSH Exploiter (essentially brute force)<\/li><li>Shellshock exploiter<\/li><li>SambaCry Exploiter<\/li><li>ElasticGroovy Exploiter<\/li><li>Struts2 Exploiter<\/li><li>WebLogic Exploiter<\/li><li>Hadoop \/ Yarn Expoiter<\/li><li>VSFTPD Exploiter<\/li><\/ul>\n\n\n\n<p><strong>2) Prohibited interaction<\/strong>&nbsp;.&nbsp;It is possible to detect interactions between networks that should be prohibited at the DOE or router level.<\/p>\n\n\n\n<p><strong>3) Horizontal spread<\/strong>&nbsp;.&nbsp;Graphical display of the movement of the &#8220;malware&#8221;.&nbsp;How a bot &#8220;transplants&#8221; in your network.<\/p>\n\n\n\n<p>All this is complemented by detailed reporting.&nbsp;For example using the MITER ATT &amp; CK matrix:<\/p>\n\n\n\n<p>Scanmap:<\/p>\n\n\n\n<p>Zero Trust Model Report&nbsp;:&nbsp;This is<\/p>\n\n\n\n<p>also a good check for your existing defenses.&nbsp;Were they able to detect this activity?&nbsp;Have all the logs arrived at your SIEM?<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Infection Monkey FAQ<\/h4>\n\n\n\n<p>Before moving on to the test results, I would like to answer a few of the most common questions about Infection Monkey.<\/p>\n\n\n\n<p><strong>Is this test dangerous for my infrastructure?<\/strong><br><strong>Can I clean &#8216;infected&#8217; devices after the test?<\/strong><br><strong>Are there any traces left on the &#8216;infected&#8217; system after removing Infection Monkey?<\/strong><br><strong>Does the Infection Monkey put a strain on the system?<\/strong><br><strong>Does the program require Internet access?<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Testing scheme<\/h2>\n\n\n\n<p>The scheme is quite simple.&nbsp;The virtual machine with Infection Monkey is in a dedicated segment.&nbsp;From it we scan the local network segment through the Check Point gateway:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Check Point IPS Results with Optimized Profile<\/h2>\n\n\n\n<p>Even in the&nbsp;Check Point&nbsp;course,&nbsp;I tried to show&nbsp;to the maximum&nbsp;how dangerous the default settings are.&nbsp;This applies to all vendors.&nbsp;You must be able to properly \u201ctighten\u201d the nuts.&nbsp;In this case, I decided to first check the Check Point default profile &#8211; Optimized.&nbsp;The results can be seen in the picture below:<\/p>\n\n\n\n<p>It is worth noting that with the default profile Infection Monkey successfully \u201chacked\u201d the test host (despite the primitiveness of the attack).&nbsp;The required signature was simply not included.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Check Point IPS Results with My Profile<\/h2>\n\n\n\n<p>The settings were made in accordance with the recommendations that were given in the course \u201c&nbsp;Check Point to Maximum&nbsp;\u201d.&nbsp;The result was completely different:<\/p>\n\n\n\n<p>At the same time, IPS prevented infection of the host and further spread of Infection Monkey.<br>It is worth noting that Check Point has pretty good forensics.&nbsp;This is how the log itself looks like:<\/p>\n\n\n\n<p>Here you can see the traffic dump, the CVE number, the type of attack, and detailed information about it, as well as recommendations for configuring Check Point.&nbsp;Example:<\/p>\n\n\n\n<p>Check Point did a good job in this regard, since&nbsp;they have a rich knowledge base of all kinds of malware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Of course, Infection Monkey is not a panacea and cannot address all potential network security problems.&nbsp;But for a free tool, this is more than interesting.&nbsp;As I said before, you can \u201cmake some noise\u201d on the net and see how your defenses behave.&nbsp;The same NGFWs with default settings can behave extremely unsatisfactorily.&nbsp;If you are not satisfied with the result, we can help you&nbsp;analyze your configuration&nbsp;.<\/p>\n\n\n\n<p>In the near future we plan to publish similar tests for another tool (&nbsp;Cymulate&nbsp;), which can be used for free, a trial version.&nbsp;There are already many more attack options.&nbsp;In addition to the results, we will share recommendations on how to strengthen the protection.&nbsp;In order not to miss the following articles, stay tuned in our channels<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Three years ago we published an article \u201c&nbsp;Online tools for the simplest Pentest&nbsp;\u201d.&nbsp;There we talked about affordable and quick ways to check the protection of your network perimeter using tools such as&nbsp;Check Point CheckMe&nbsp;,&nbsp;Fortinet Test Your Metal&nbsp;, etc.&nbsp;But sometimes a more serious test is required when you want to &#8220;make noise&#8221; already inside the network&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How To Check IPS? Infection Monkey vs Check Point | ValeurBit Infosec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/valeurbit.com\/blog\/how-to-check-ips-infection-monkey-vs-check-point\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Check IPS? Infection Monkey vs Check Point | ValeurBit Infosec\" \/>\n<meta property=\"og:description\" content=\"Three years ago we published an article \u201c&nbsp;Online tools for the simplest Pentest&nbsp;\u201d.&nbsp;There we talked about affordable and quick ways to check the protection of your network perimeter using tools such as&nbsp;Check Point CheckMe&nbsp;,&nbsp;Fortinet Test Your Metal&nbsp;, etc.&nbsp;But sometimes a more serious test is required when you want to &#8220;make noise&#8221; already inside the network...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/valeurbit.com\/blog\/how-to-check-ips-infection-monkey-vs-check-point\/\" \/>\n<meta property=\"og:site_name\" content=\"ValeurBit Infosec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/valeurbitinfo\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-03T14:51:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-12T12:27:19+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:site\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\",\"name\":\"Valeurbit Infosec\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/valeurbitinfo\/\",\"https:\/\/www.instagram.com\/valeurbit\",\"https:\/\/www.linkedin.com\/company\/valeurbit-infosec\/\",\"https:\/\/twitter.com\/valeurbit\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"contentUrl\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"width\":1080,\"height\":512,\"caption\":\"Valeurbit Infosec\"},\"image\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"name\":\"ValeurBit Infosec\",\"description\":\"Cyber Security Company\",\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/valeurbit.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/valeurbit.com\/blog\/how-to-check-ips-infection-monkey-vs-check-point\/#webpage\",\"url\":\"https:\/\/valeurbit.com\/blog\/how-to-check-ips-infection-monkey-vs-check-point\/\",\"name\":\"How To Check IPS? Infection Monkey vs Check Point | ValeurBit Infosec\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\"},\"datePublished\":\"2021-02-03T14:51:27+00:00\",\"dateModified\":\"2021-02-12T12:27:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/how-to-check-ips-infection-monkey-vs-check-point\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/valeurbit.com\/blog\/how-to-check-ips-infection-monkey-vs-check-point\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/valeurbit.com\/blog\/how-to-check-ips-infection-monkey-vs-check-point\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/valeurbit.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Check IPS? Infection Monkey vs Check Point\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/valeurbit.com\/blog\/how-to-check-ips-infection-monkey-vs-check-point\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/how-to-check-ips-infection-monkey-vs-check-point\/#webpage\"},\"author\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\"},\"headline\":\"How To Check IPS? Infection Monkey vs Check Point\",\"datePublished\":\"2021-02-03T14:51:27+00:00\",\"dateModified\":\"2021-02-12T12:27:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/how-to-check-ips-infection-monkey-vs-check-point\/#webpage\"},\"wordCount\":993,\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"articleSection\":[\"Valeurbit\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\",\"name\":\"ValeurBit\",\"sameAs\":[\"https:\/\/valeurbit.com\/blog\"],\"url\":\"https:\/\/valeurbit.com\/blog\/author\/valeurbit\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/19919"}],"collection":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/comments?post=19919"}],"version-history":[{"count":0,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/19919\/revisions"}],"wp:attachment":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/media?parent=19919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/categories?post=19919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/tags?post=19919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}