Visualizing the attack lifecycle from phishing to data exfiltration
Attacker crafts convincing phishing email
Opens email and interacts with content
Malicious code executes on victim system
Attacker gains initial foothold
Backdoor installed for persistent access
Continuous attacker control established
Cookies, SSH keys, and passwords stolen
Credentials available for lateral movement
Internal network accessed via proxy
Internal applications compromised
Servers accessed, data exfiltrated
Network fully compromised
Click on any phase button to simulate that attack stage