CyberBase

Attack Flows

Step-by-step breakdowns of real-world attack patterns. Each flow shows what the attacker does, what the defender can do, and what the victim experiences — phase by phase.

7 attack patterns
Attacker · Defender · Victim
MITRE ATT&CK mapped

All attack patterns

7 / 7
Severity 1/5 2/5 3/5 4/5 5/5