Creating a simulation
You can create a simulation for an network attack on an SSH protocol.
Procedure
- Click the Risks tab.
- On the navigation menu, select .
- From the Actions list, select New.
- Type a name for the simulation.
- Select Current Topology.
- Select the Use Connection Data check box.
- From the Where do you want the simulation to begin list, select an origin for the simulation.
- Add the simulation attack, Attack targets one of the following open ports using protocols.
- For this simulation, click open ports, and then add port 22.
-
Click protocols, and then select TCP.
SSH uses TCP.
- Click OK.
- Click Save Simulation.
-
From the Actions list, select Run
Simulation.
The results column contains a list with the date the simulation was run and a link to view the results.
- Click View Results.
Results
A list of assets containing SSH vulnerabilities is displayed in the results, allowing network administrators to approve SSH connections that are allowed or expected in your network. The communications that are not approved can be monitored for events or offenses.
The results that are displayed provide your network administrators or security professionals with a visual representation of the attack path and the connections that the attack could take in your network. For example, the first step provides a list of the directly connected assets affected by the simulation. The second step lists assets in your network that can communicate to first level assets in your simulation.
The information provided in the attack allows you to strengthen and test your network against thousands of possible attack scenarios.