Install and configure a Jackal

The following guide will show you how to install a Jackal on-prem and modify configurations.


Jackals

Jackals are Method’s lightweight, deployable security agents that execute tools and workfllows on target systems. Installed agents enable assumed breach operations and on-prem assessments.

For additional details about Jackal infrastructure, see Jackals.

Install a Jackal

  1. Download the latest Jackal version by visiting the Method platform and navigating to Install a Jackal in the left navigation.
Install a Jackal
  1. Configure your Jackal by providing a name, selecting the Environment, Operating System, and Execution Mode. Then select Create Jackal.
Install a Jackal
  1. You can install the Jackal via command or by downloading the Jackal binary to your target system.
Install a Jackal
  1. Once deployed, click View Jackal to review and configure your Jackal against exfiltration, workflow execution control, and C2 parameters to modify levels of riskiness during an operation.
Configure Jackal parameters and
  1. Navigate to Admin > Jackals to view a full list of your deployed Jackals.
List of available Jackals