Our toolchain front-end allows the user to
- Build a network topology graph
- Generate an attack graph
- Simulate an attack
The user can either build a topology graph manually, or upload the topology graph JSON file, or both (merging networks). They can also reset the topology graph and save the topology graph in JSON.
Click the New machine/router/firewall configuration button and upload the configuration file. The uploaded device will then appear on the devices list.
Click and drag a selected device from the devices list, then drop it at the pane (at the bottom of the Network Topology section)
Right click a device in the pane you want to remove
Click on a device you wish to select on the pane. The selected device will then have a green border.
To unselect a device, simply click the selected device (in green border) again
Click on a device that you want as a source, then click on a device you want as a destination. The link will automatically be created.
Click on a link you want to remove
Click the Clear Topology Graph button. The whole pane will be empty.
Click the Save Topology Graph button to download the topology graph in JSON format.
Click the Upload existing topology button and upload a network.
The uploaded network will appear on the topology graph pane.
Click the Upload existing topology button and upload a network.
The uploaded network will appear on the topology graph pane alongside the one you are building. You can then merge both networks as you wish.
Once the complete topology graph is in the topology graph pane, click the Generate Attack Graph button to generate an attack graph for your network. The attack graph and metrics will then be generated and displayed.
You can press the Reachability Graph button to see the reachability graph of your input network in a popup. Press OK button at the bottom-right corner to close it.
Click the three-line symbol at the top-right of the webpage to open the attack agent setting. You can then either select the pre-defined attack agent or make a custom one.
To create a custom attack agent,...
Once an attack graph is generated after step 1, press the Simulate button to simulate an attack. The attack will be animated on the attack graph step by step.
You can adjust the size of a Network Topology and an Attack Graph sections by using the slider at the middle of the web page.