HTB CTF & Threat Range Features
Simulation (4)
-
Test Agent Deployment
Executes attacks on a range of surfaces from email and desktop to cloud and network environments.
-
Breach Simulation
Simulates a compromized network environment resulting from neglegence, misconfiguration, or other user errors that expose sensitive information.
-
Attack Simulation
Simulates a real-world attack on networks and endpoints with the intent to harm a business.
-
Resolution Guidance
Guides users through the resolution process and give specific instructions to remedy individual occurrences.
Customization (3)
-
Multi-Vector Assessment
Allows users to simulate threats that attack multiple points of entry to infect computers and networks.
-
Scenario Customization
Allows users to create attack scenarios that mimic their real-world working enviroment.
-
Range of Attack Types
Allows for the simulation of multiple attack variants. Simulates attacks targeting different kinds of endpoints and networks.
Administration (3)
-
Reporting
Provides results of the simulation and reveals potential security gaps or vulnerabilitites.
-
Risk Evaluation
Identifies potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
-
Automated Testing
Automates attacks and adversarial logic for continuous testing.


