Install and configure a Jackal

The following guide will show you how to install a Jackal on-prem and modify configurations.


Jackals are Method’s lightweight, deployable security agents that execute Tools on target systems. For details on Jackal architecture, see Jackal C2.

Install a Jackal

  1. Download the latest Jackal version by visiting the Method platform and navigating to Install a Jackal in the left navigation.
Install a Jackal
  1. Configure your Jackal by providing a name, selecting the Environment, Operating System, and Execution Mode. Then select Create Jackal.
Install a Jackal
  1. You can install the Jackal via command or by downloading the Jackal binary to your target system.
Install a Jackal
  1. Once deployed, click View Jackal to review and configure your Jackal against exfiltration, workflow execution control, and C2 parameters to modify levels of riskiness during an operation.
Configure Jackal parameters
  1. Navigate to Admin > Jackals to view a full list of your deployed Jackals.
List of available Jackals