Attack Path Simulation illustrates how attacker can exploit your environment.
It models how attacker can take advantage of different vulnerabilities and misconfigurations to move inside the network and to find valuable targets.
Attack Path Simulation is a core feature of WithSecure Exposure Management (XM), for pointing out your most vulnerable assets. It has already been part of XM’s Remediation Impact scoring system throughout the Early Access period.
We are now bringing the visualization of the attack path simulation, with which you are able to:
- Familiarize with the attacker point of view
- See which vulnerabilities and misconfigurations are part of an attack path and should be thus acted on
- Convince your stakeholders why a certain finding needs fixing
You can find any detected attack paths from Environment / Exposure / Recommendation in the column Related attack paths.
Click to open one recommendation (with non-zero value) in the Related attack paths. If you don’t have any (non-zero values), you can pat yourself on the back for having a really good security posture.
Notice how the two of the assets have higher score than the third. This is because they are part of an attack path and have higher importance as well.
Click the Attack Path Visualization tab. Here you can see the assets and how vulnerabilities and misconfigurations in other assets could be used to breach these particular assets.
Have you already checked your attack paths? We highly recommend checking these as part of your regular activities as an XM admin.
WithSecure™ Elements Exposure Management uses patent-pending AI-based attack path simulation technologies for heuristic exposure hunting and adversarial exposure validation.