Security validation

Validate your ability to detect advanced threats

Create an attack campaign to measure the effectiveness and operational readiness of your cyber strategy. Test against various sets of attack paths and go beyond pentesting.
- Identify offensive behaviors not detected by existing tools to know blind spots in your defense
- Measure the speed of detection by defense tools
- Map the most and least used detection tools

Easily create a campaign and run your attack simulation in a few minutes:


1) Choose a scenario from Threat Library > Scenarios

The scenario serves as a template for generating the sequential list of events used in the campaign. Please be aware that the number of events executed in a campaign is determined by the number of Target Systems defined in the campaign perimeter. Each system event will be executed for each Target System.


2) Fill in the campaign description details

    The name and description are filled in with information from the selected scenario but you can change them.
    Add the target type. This data is only used for the generation of graphs and KPIs.
    Select the Attack Vector used to execute the events.


3) Define the scope of your campaign

Depending on the scenario selected, you will need to enter the IP addresses targeted by the simulations at network level (e.g. scans) and/or the Target Systems involved by the simulations at OS level.
    Network scope: a list of IPv4 addresses or ranges in CIDR format (e.g. 192.168.1.0/24). Use a space to separate each item.
    System scope: select from your list of previous targets configured or create a new one.
A default connection test checks if the remote access method (like SSH, WMI) is enabled and if flows are open between the Attack Vector and the Target System. Access to the next step is authorized only if tests are validated (see  FAQ ).


4) Define the execution conditions of the campaign

    Simulation start: immediate execution (run now) or scheduled for a later launch
    Events launch: in automatic mode events follow one another without user intervention (with an optional delay between each event) while in manual mode you have to start each event from the app.

Hint: If you choose an automatic execution of events, we recommend setting a delay between them to facilitate the analysis of detection behaviors.

    A summary of the campaign details is shown. If all is good, click on Start or Plan to check it.


5) Provide detection information for executed events

Adjust the detection status and enrich it with detection source, date & time, and evidence.


6) Results allows you to measure the effectiveness of your defenses

Scores, graphs, and KPIs are updated in real-time based on the provided data.