Powered by Tesserarius Engine — Detection Training as a Service

Keep Your SOC Team Awake

Continuous readiness assessment with realistic attack simulations. Measure how alert your analysts really are — not in a lab, but in their actual SIEM.

5
ATT&CK Scenarios
17
Vendor Formats
20
Assets per Company
30+
Investigation Tasks

Built for SOC Readiness

Everything you need to assess and maintain analyst alertness

Scenario-Driven Attacks

Phase-based attack chains aligned with MITRE ATT&CK. Preparation, buildup, attack peak, and aftermath — just like real incidents.

Realistic Background Noise

Business-hour aware noise engine generates normal user activity — logins, file access, web browsing, DNS queries — mixed with attack events.

🔑

Vendor-Specific Logs

Real FortiGate, Palo Alto, CrowdStrike, Windows Event, Zscaler log formats. Not generic fake data — actual vendor syntax your analysts will see in production.

🏢

Multi-Company Support

Create multiple virtual companies with different vendor stacks, unique subnets, and dedicated Splunk indexes. Each customer gets their own environment.

📈

Analyst Scoring

Auto-graded investigation tasks per alert. Track analyst performance — correct answers, response time, pass/fail rates. Measure improvement over time.

🚀

Splunk HEC Delivery

Logs delivered directly to Splunk via HEC. Per-company indexes, proper sourcetypes, CIM-aligned field extraction. Ready for detection engineering.

Attack Scenarios

Five core use cases covering the most critical SOC training areas

HIGH

VPN Password Spray

T1110.003

External attacker sprays credentials against VPN. DNS recon, test logins, spray across all accounts, compromise and lateral recon.

CRIT

Web Application Exploit

T1190

Directory enumeration, SQLi and path traversal probing, webshell upload, reverse shell, internal network scanning from DMZ.

CRIT

Lateral Movement

T1021

Phishing entry via macro, credential dumping (LSASS), RDP pivot to admin workstation, SMB access to file server, DC compromise.

CRIT

Admin Group Abuse

T1098.007

Compromised standard user enumerates groups, fails admin access, adds self to Domain Admins, accesses NTDS.dit and creates backdoor.

CRIT

Data Exfiltration

T1041

Database dump, file collection, 7zip compression, chunked HTTPS upload to C2 domain, evidence cleanup and log clearing.

Supported Vendors

Real log formats from the tools your SOC actually uses

Fortinet FortiGate
Palo Alto Networks
Cisco ASA
Sophos XG
CrowdStrike Falcon
SentinelOne
Microsoft Defender
Carbon Black
Zscaler ZIA
Symantec ProxySG
Windows Event Log
Infoblox DNS
nginx
Apache
Microsoft IIS
Splunk HEC
PostgreSQL

Is Your SOC Team Awake?

Find out. Start running attack simulations and see who catches them.

Sign In to Dashboard