Select an Attack Type
Phishing Attack
Social engineering to steal credentials
High Impact
Man-in-the-Middle Attack
Intercepting unencrypted communications
High Impact
Denial of Service (DoS)
Overwhelming server with traffic
High Impact
Password Brute Force
Trying password combinations repeatedly
Medium Impact
SQL Injection
Inserting malicious SQL commands
High Impact
Attack Simulation
Current Step
Attacker crafts fake email
Attacker
User
Server
Simulation Progress1 / 6
Phishing Attack
Social engineering to steal credentials
Impact Level: High
Attack Flow:
- 1. Attacker crafts fake email
- 2. User receives email
- 3. User clicks malicious link
- 4. Fake login page loads
- 5. Credentials captured
- 6. Account compromised
Event Log
Waiting for simulation to start...