Back to home

Onboarding Journey

Table of Contents

ATTACK SCENARIOS SET-UP

In this section, you will learn all the different ways you can create new attacks, modify existing ones, and even write your very own attack with Python using the SafeBreach SDK.

This section’s objectives are:

  • Learn how to filter and choose attacks from the Playbook
  • Modify existing attack and change it’s parameters
  • Understand the main blocks of our breach studio Python SDK

Step 1 – Configure Getting Started Attacks

The easiest way to get started with the attacks is to configure an attack from our “getting started” package.

Read More

Find the “ready to run” markers on the SafeBreach Scenarios screen:

Choose one of these scenarios and pick an attack from the left panel. To change it’s parameters, click on Duplicate Attack:

Go to Attack Actions tab and change one of the paths in which the malware file will be written:

Give your modified attack a name that you’ll remember.

Save the attack and import it to your existing “Getting Started” scenario.

Run the scenario.

Step 2 – Attack Phases

There are four attack phases in the cyber security world. Infiltration, Host level, Lateral Movement and Exfiltration. Watch this video and learn about them and the coverage that SafeBreach provides to each of them

Step 3 – Common Use Cases

SafeBreach platform can be used for many reasons – it can verify your security controls, it can test your system’s against common attacks in your industry, it can verify the isolation of your network perimeters and more. Check out the common use-cases below and learn about the different use cases of our platform

US-CERT-Alert-Coverage
Industry-Specific
Network-Segmentation
Ransomware-Coverage
APT-Coverage
Data-Leak-Prevention
Endpoint-Validation

Step 4 – Breach Studio

With the SafeBreach Breach Studio, you can write your own attack scenarios using the SafeBreach SDK. With SafeBreach’s Python libraries and easy-to-use tutorials, you can quickly create custom attacks like in no time.

Read More

Quiz time

1 / 3

What are APTs?

2 / 3

Where can you change the attack parameters?

3 / 3

What are the general cyber attack phases?

Your score is

Congratulations !

You have finished the step.   
Proceed to the next step – Lowering Security Risk

Proceed