Credentials

On this screen you can feed the Infection Monkey “stolen” credentials from your network, simulating an attacker with inside knowledge.

Configure credentials