Interactive visualizations to help you understand how cyber attacks work and how to prevent them.
Distributed Denial of Service - Overwhelming a target with traffic.
Intercepting communication between two parties secretly.
Deceptive attempts to steal sensitive information.
Manipulating database queries to access unauthorized data.
Injecting malicious scripts into trusted websites.
Systematically guessing passwords to gain access.
Malware that encrypts your files and demands payment.
Recording every keystroke to steal passwords and messages.
Using leaked passwords to hack into other accounts.
Tricking a user into performing unwanted actions on a site.
Stealing a session cookie to take over a user account.
Redirecting traffic by corrupting the domain name system.
Accessing restricted files by manipulating file paths.
Tricking users into clicking invisible buttons or overlays.
Executing arbitrary operating system commands on the server.
Gamified SIEM simulation: Spot and block malicious requests in real-time logs.
Packet filtering simulation: Create rules to allow or block network traffic.
Manage a live security breach and make critical decisions to contain the threat.
Assign roles and permissions to users to enforce the principle of least privilege.
Scan infrastructure for CVEs and deploy patches to secure systems.
Visualizing how cryptographic salts defeat rainbow table attacks.
Symmetric vs Asymmetric encryption interactive lab.
Analyze and modify JSON Web Tokens to understand signature verification.
Safely detonate suspicious files to analyze their behavior.