Configuration & Exploration
Attacker selection
Choose the current attacker.
Attacker entry points
Select targets that act as entry points for the attacker.
Attacker exit points
Select targets that act as exit points for the attacker.
Vulnerabilities
Pick an element, then select/unselect the vulnerabilities to associate.
Links between targets
—
Results