Attack Library

The Attack Library is continually updated by our dedicated cybersecurity team to include new and evolving cyber threats. We are constantly researching the latest in vulnerabilities, threats, and attack methods so we can deliver the cutting-edge intelligence needed to keep your networks and devices protected. Our library consists of over 10,000 attacks – and growing – including viruses, malware, zero-day attacks, DoS, Spyware, vulnerabilities, and more.

1 Year Subscription

SKU: ATK-LIB-NTG-SUBS-1YR Category:

Description

Test Network Security and Harden Defences

Use the Apposite Attack Library with our AppStorm and AppPlayback traffic generation solutions to generate malicious attacks and legitimate application traffic simultaneously.

Simulate real-world network traffic scenarios and high scale cyber attacks to optimize security devices, validate DDoS defences, improve security performance, and ensure network resiliency.

Firewall Test Diagram

Benefits

  • Measure the performance of cybersecurity infrastructure and build and maintain threat resilient networks.
  • Validate DoS defences, protect against zero-day attacks, and increase attack readiness.
  • Generate legitimate application traffic and malicious attacks simultaneously to benchmark the performance of application-aware devices and networks.
  • Optimize security devices and systems such as next-generation firewalls, IPS and IDS systems, and SD-WAN gateways.
  • Emulate large-scale botnet attacks to stress test your network and discover hidden weaknesses.
  • Simulate realistic traffic scenarios for the best possible cyber range training environment.

Features

  • Easily search for specific CVEs based on vendor name, CVE number, or type of attack using our intuitive search engine.
  • Configure attacks to run sequentially or parallel.
  • Simulate brute force attacks by setting retries if attacks are blocked on the first attempt.
  • Control the rate of attack by setting packets per second.
  • Configure the percentage of malware from each year of CVEs dating back to 2013.
  • Specify the duration of attacks and how many cycles using the load profile.
  • Emulate compromised devices and command centers.
  • View statistics in real-time or after the test is complete with our offline analyzer for each application and each attack.
  • Capture port level stats like total data transferred, throughput, packets per second, and latency.

Simulate Cyber Attacks at High Scale

Easily search for specific CVEs based on vendor name, CVE number, or type of attack using our intuitive search engine and unique design.

Emulate compromised devices and command centres then select the rate, length and scale of your cyber attack in just a few short steps using the wizard-driven test configuration process in both AppStorm and AppPlayback.

Additional information

Vendor

Apposite

Documents

    View Datasheet