Cyber Attack Visualizer

Learn how cyber attacks work visually

Educational Tool

Select an Attack Type

Phishing Attack
Social engineering to steal credentials
High Impact
Man-in-the-Middle Attack
Intercepting unencrypted communications
High Impact
Denial of Service (DoS)
Overwhelming server with traffic
High Impact
Password Brute Force
Trying password combinations repeatedly
Medium Impact
SQL Injection
Inserting malicious SQL commands
High Impact

Attack Simulation

Current Step
Attacker crafts fake email
Attacker
User
Server
Simulation Progress1 / 6
Phishing Attack

Social engineering to steal credentials

Impact Level: High

Attack Flow:

  1. 1. Attacker crafts fake email
  2. 2. User receives email
  3. 3. User clicks malicious link
  4. 4. Fake login page loads
  5. 5. Credentials captured
  6. 6. Account compromised

Event Log

Waiting for simulation to start...