Security Attack Simulator

Replay realistic attack paths against this student data environment and watch how each AWS control activates in sequence—from network isolation, to IAM, to GuardDuty alerts.

Fully simulated — no real AWS calls are made.

Live Security Posture

0
Attacks Blocked
0
Security Alerts Generated
100%
Detection Rate (Simulated)
0
Data Breaches
Three-Tier VPC Path
🥷
🌐
Internet
Untrusted
🚧
Gateway
ALB + WAF
⚙️
App Tier
Private
🗄️
Database
Isolated
✓ Attack Blocked
Security Groups
Network ACLs
IAM Policies
KMS Encryption
GuardDuty

Security Event Stream

[--:--:--] Security monitoring active. Select an attack scenario to begin.
💻 Select an attack to see what the attacker would run.
🔍 When an attack runs, a GuardDuty-style finding will appear here.
🛠️ Incident response steps will appear here.