| <!DOCTYPE html> |
| <html lang="en"> |
| <head> |
| <meta charset="UTF-8"> |
| <meta name="viewport" content="width=device-width, initial-scale=1.0"> |
| <title>Attack Flow Timeline Visualization</title> |
| <script src="https://cdn.tailwindcss.com"></script> |
| <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.4.0/css/all.min.css"> |
| <style> |
| .attack-card { |
| transition: all 0.3s ease; |
| transform-origin: center; |
| } |
| .attack-card:hover { |
| transform: translateY(-5px); |
| box-shadow: 0 10px 15px -3px rgba(0, 0, 0, 0.1); |
| } |
| .attack-card.active { |
| border-left-width: 4px; |
| transform: translateY(-5px); |
| } |
| .timeline-connector { |
| position: relative; |
| height: 4px; |
| background: linear-gradient(90deg, #e5e7eb, #9ca3af); |
| } |
| .timeline-connector::after { |
| content: ''; |
| position: absolute; |
| top: -4px; |
| width: 12px; |
| height: 12px; |
| border-radius: 50%; |
| background-color: #3b82f6; |
| transform: translateX(-50%); |
| } |
| .severity-badge { |
| font-size: 0.65rem; |
| padding: 0.15rem 0.4rem; |
| } |
| .severity-critical { |
| background-color: #fee2e2; |
| color: #dc2626; |
| } |
| .severity-high { |
| background-color: #fef3c7; |
| color: #d97706; |
| } |
| .severity-emergency { |
| background-color: #ffedd5; |
| color: #ea580c; |
| } |
| .defense-badge { |
| font-size: 0.7rem; |
| padding: 0.2rem 0.5rem; |
| } |
| .animate-pulse-slow { |
| animation: pulse 3s cubic-bezier(0.4, 0, 0.6, 1) infinite; |
| } |
| @keyframes pulse { |
| 0%, 100% { |
| opacity: 1; |
| } |
| 50% { |
| opacity: 0.5; |
| } |
| } |
| .attack-flow-container { |
| scroll-behavior: smooth; |
| } |
| </style> |
| </head> |
| <body class="bg-gray-50"> |
| <div class="container mx-auto px-4 py-8"> |
| <div class="text-center mb-10"> |
| <h1 class="text-3xl font-bold text-gray-800 mb-2">Advanced Persistent Threat Kill Chain</h1> |
| <p class="text-gray-600 max-w-3xl mx-auto">Visualization of the complete attack flow with interactive defense detection points</p> |
| </div> |
|
|
| <div class="bg-white rounded-xl shadow-sm border border-gray-200 p-6 mb-8"> |
| <div class="flex justify-between items-center mb-6"> |
| <div> |
| <h2 class="text-xl font-semibold text-gray-800">Attack Flow Timeline</h2> |
| <p class="text-gray-500 text-sm">Click on any attack phase to view detailed forensic evidence</p> |
| </div> |
| <div class="flex space-x-2"> |
| <button id="scroll-left" class="p-2 bg-white rounded-md border border-gray-200 hover:bg-gray-50"> |
| <i class="fas fa-chevron-left"></i> |
| </button> |
| <button id="scroll-right" class="p-2 bg-white rounded-md border border-gray-200 hover:bg-gray-50"> |
| <i class="fas fa-chevron-right"></i> |
| </button> |
| </div> |
| </div> |
|
|
| <div class="relative"> |
| <div class="attack-flow-container overflow-x-auto pb-6 -mx-4 px-4" style="scrollbar-width: none;"> |
| <div class="flex space-x-6 min-w-max"> |
| |
| <div class="flex items-center"> |
| <div class="timeline-connector w-24" style="background: linear-gradient(90deg, #3b82f6, #9ca3af);"></div> |
| </div> |
| |
| |
| </div> |
| </div> |
| </div> |
| </div> |
|
|
| <div class="grid grid-cols-1 lg:grid-cols-3 gap-8"> |
| <div class="lg:col-span-2"> |
| <div class="bg-white rounded-xl shadow-sm border border-gray-200 overflow-hidden"> |
| <div class="border-b border-gray-200 px-6 py-4 bg-gray-50"> |
| <h3 class="font-semibold text-gray-800">Attack Phase Forensic Details</h3> |
| </div> |
| <div id="attack-details" class="p-6"> |
| <div class="text-center py-12"> |
| <div class="mx-auto w-16 h-16 rounded-full bg-blue-50 flex items-center justify-center mb-4"> |
| <i class="fas fa-mouse-pointer text-blue-500 text-2xl"></i> |
| </div> |
| <h4 class="text-lg font-medium text-gray-700 mb-2">Select an attack phase</h4> |
| <p class="text-gray-500 max-w-md mx-auto">Click on any attack card in the timeline to view detailed forensic information about the attack behavior and triggered defenses</p> |
| </div> |
| </div> |
| </div> |
| </div> |
|
|
| <div> |
| <div class="bg-white rounded-xl shadow-sm border border-gray-200 overflow-hidden"> |
| <div class="border-b border-gray-200 px-6 py-4 bg-gray-50"> |
| <h3 class="font-semibold text-gray-800">Defense Detection Summary</h3> |
| </div> |
| <div id="defense-summary" class="p-6"> |
| <div class="space-y-4"> |
| <div class="flex items-start"> |
| <div class="flex-shrink-0 mt-1"> |
| <div class="w-3 h-3 rounded-full bg-red-500 animate-pulse-slow"></div> |
| </div> |
| <div class="ml-3"> |
| <h4 class="text-sm font-medium text-gray-800">7 Attack Phases Detected</h4> |
| <p class="text-xs text-gray-500 mt-1">Complete kill chain visibility</p> |
| </div> |
| </div> |
| <div class="flex items-start"> |
| <div class="flex-shrink-0 mt-1"> |
| <div class="w-3 h-3 rounded-full bg-yellow-500"></div> |
| </div> |
| <div class="ml-3"> |
| <h4 class="text-sm font-medium text-gray-800">6 Security Products Triggered</h4> |
| <p class="text-xs text-gray-500 mt-1">Multi-layer defense detection</p> |
| </div> |
| </div> |
| <div class="flex items-start"> |
| <div class="flex-shrink-0 mt-1"> |
| <div class="w-3 h-3 rounded-full bg-green-500"></div> |
| </div> |
| <div class="ml-3"> |
| <h4 class="text-sm font-medium text-gray-800">100% Phases Logged</h4> |
| <p class="text-xs text-gray-500 mt-1">Comprehensive forensic evidence</p> |
| </div> |
| </div> |
| </div> |
|
|
| <div class="mt-8"> |
| <h4 class="text-sm font-semibold text-gray-700 mb-3">Defense Coverage</h4> |
| <div class="space-y-3"> |
| <div> |
| <div class="flex justify-between text-xs text-gray-500 mb-1"> |
| <span>Email Security</span> |
| <span>Phase 1</span> |
| </div> |
| <div class="w-full bg-gray-200 rounded-full h-2"> |
| <div class="bg-red-500 h-2 rounded-full" style="width: 14%"></div> |
| </div> |
| </div> |
| <div> |
| <div class="flex justify-between text-xs text-gray-500 mb-1"> |
| <span>Endpoint Protection</span> |
| <span>Phase 2</span> |
| </div> |
| <div class="w-full bg-gray-200 rounded-full h-2"> |
| <div class="bg-yellow-500 h-2 rounded-full" style="width: 28%"></div> |
| </div> |
| </div> |
| <div> |
| <div class="flex justify-between text-xs text-gray-500 mb-1"> |
| <span>Network Analysis</span> |
| <span>Phase 3</span> |
| </div> |
| <div class="w-full bg-gray-200 rounded-full h-2"> |
| <div class="bg-green-500 h-2 rounded-full" style="width: 42%"></div> |
| </div> |
| </div> |
| <div> |
| <div class="flex justify-between text-xs text-gray-500 mb-1"> |
| <span>User Behavior</span> |
| <span>Phase 4</span> |
| </div> |
| <div class="w-full bg-gray-200 rounded-full h-2"> |
| <div class="bg-blue-500 h-2 rounded-full" style="width: 56%"></div> |
| </div> |
| </div> |
| <div> |
| <div class="flex justify-between text-xs text-gray-500 mb-1"> |
| <span>Data Protection</span> |
| <span>Phase 5</span> |
| </div> |
| <div class="w-full bg-gray-200 rounded-full h-2"> |
| <div class="bg-purple-500 h-2 rounded-full" style="width: 70%"></div> |
| </div> |
| </div> |
| <div> |
| <div class="flex justify-between text-xs text-gray-500 mb-1"> |
| <span>Host Detection</span> |
| <span>Phase 6</span> |
| </div> |
| <div class="w-full bg-gray-200 rounded-full h-2"> |
| <div class="bg-pink-500 h-2 rounded-full" style="width: 84%"></div> |
| </div> |
| </div> |
| <div> |
| <div class="flex justify-between text-xs text-gray-500 mb-1"> |
| <span>Full Traffic Analysis</span> |
| <span>Phase 7</span> |
| </div> |
| <div class="w-full bg-gray-200 rounded-full h-2"> |
| <div class="bg-indigo-500 h-2 rounded-full" style="width: 100%"></div> |
| </div> |
| </div> |
| </div> |
| </div> |
| </div> |
| </div> |
| </div> |
| </div> |
| </div> |
|
|
| <script> |
| |
| const attackSteps = [ |
| { |
| id: 1, |
| title: "Phishing Email Delivery", |
| icon: "envelope", |
| color: "bg-red-100 text-red-600", |
| behavior: "Forged 'Embrace AI Change' notification email containing malicious file disguised as files.zip", |
| defenses: "Email Security Gateway", |
| alerts: [ |
| { |
| severity: "critical", |
| message: "Detected spoofed sender email | From: itsupport@fakecompany[.]com → To: victim@corp.com | Contains malicious attachment (SHA256: a1b2c3...) | Identified as Emotet phishing template" |
| } |
| ], |
| forensic: [ |
| "Sender IP: 192.168.1.45 (Bulgaria)", |
| "Attachment SHA256: a1b2c3d4e5f6...", |
| "Email headers show DKIM failure", |
| "Matched known Emotet template (90% similarity)" |
| ] |
| }, |
| { |
| id: 2, |
| title: "Trojan Execution", |
| icon: "bug", |
| color: "bg-yellow-100 text-yellow-600", |
| behavior: "Victim downloads malicious file triggering PowerShell script that downloads Cobalt Strike DLL and injects into legitimate process", |
| defenses: "Endpoint Detection & Response (EDR)", |
| alerts: [ |
| { |
| severity: "high", |
| message: "Suspicious process injection | Process: C:\\Windows\\System32\\explorer.exe → Loaded module: a09xdf.dll | DLL signature invalid and matches known Cobalt Strike signature" |
| } |
| ], |
| forensic: [ |
| "Process tree: files.zip → powershell.exe → explorer.exe", |
| "DLL memory allocation pattern matches Cobalt Strike", |
| "Network connection attempt to 185.123.32.1", |
| "Registry key modification: HKLM\\Software\\Microsoft\\Windows" |
| ] |
| }, |
| { |
| id: 3, |
| title: "C2 Establishment", |
| icon: "satellite-dish", |
| color: "bg-green-100 text-green-600", |
| behavior: "HTTPS heartbeat communication via CDN domain (api.cloudfront[.]com), deploying reverse SSH tunnel to internal jump server", |
| defenses: "Network Traffic Analysis (NTA)", |
| alerts: [ |
| { |
| severity: "emergency", |
| message: "Anomalous outbound connection | Target IP: 54.231.1.1 (AWS Singapore) | Protocol: HTTPS | Abnormal certificate (CN=*.cloudfront[.]com but issued by wildcard Let's Encrypt cert)" |
| } |
| ], |
| forensic: [ |
| "C2 Domain: api.cloudfront[.]com (resolved to 54.231.1.1)", |
| "HTTPS traffic pattern: 5KB every 17 seconds", |
| "Certificate issuer: Let's Encrypt (unusual for CDN)", |
| "SSH tunnel established to 10.8.8.12 (internal jump server)" |
| ] |
| }, |
| { |
| id: 4, |
| title: "Credential Theft", |
| icon: "user-secret", |
| color: "bg-blue-100 text-blue-600", |
| behavior: "Using Mimikatz to extract Chrome browser cookies and forging User-Agent (synchronizing victim's browser fingerprint)", |
| defenses: "User Behavior Analytics (UEBA)", |
| alerts: [ |
| { |
| severity: "high", |
| message: "Abnormal browser session | User: Victim_Account | Source IP: 172.16.1.23 → Device fingerprint changed (new VM characteristics/QEMU virtual GPU)" |
| } |
| ], |
| forensic: [ |
| "Mimikatz process detected in memory (obfuscated as svchost.exe)", |
| "Chrome cookie database accessed", |
| "User-Agent changed to match victim's original browser", |
| "New login session from 172.16.1.23 with VM fingerprint" |
| ] |
| }, |
| { |
| id: 5, |
| title: "Cloud Docs Penetration", |
| icon: "cloud", |
| color: "bg-purple-100 text-purple-600", |
| behavior: "Hijacked Yuque API Token used to access 'Production Environment Operations Manual', extracting embedded SSH private key (Base64 encoded)", |
| defenses: "Data Loss Prevention (DLP)", |
| alerts: [ |
| { |
| severity: "critical", |
| message: "Sensitive data access | User: Victim_Account | Action: Downloaded document ID: YUQUE-1234 | Content matched keyword: 'prod_ssh_private_key'" |
| } |
| ], |
| forensic: [ |
| "API call to yuque.com/v2/api/documents/YUQUE-1234", |
| "Document contains Base64 encoded SSH key", |
| "Key belongs to dba_admin@10.8.8.88", |
| "Unusual access time: 02:37 AM local time" |
| ] |
| }, |
| { |
| id: 6, |
| title: "Production Intrusion", |
| icon: "server", |
| color: "bg-pink-100 text-pink-600", |
| behavior: "Using SSH certificate from jump server to log into MySQL database server (IP: 10.8.8.88, account: dba_admin)", |
| defenses: "Host Intrusion Detection (HIDS)", |
| alerts: [ |
| { |
| severity: "emergency", |
| message: "Unusual time SSH login | Account: dba_admin | Source IP: 10.8.8.12 (test env jump server) | Action: Executed SHOW DATABASES" |
| } |
| ], |
| forensic: [ |
| "SSH login at 03:12 AM from 10.8.8.12", |
| "Executed commands: SHOW DATABASES, SELECT * FROM users", |
| "Session duration: 8 minutes 23 seconds", |
| "Unusual query pattern (scanning all tables)" |
| ] |
| }, |
| { |
| id: 7, |
| title: "Data Exfiltration", |
| icon: "file-export", |
| color: "bg-indigo-100 text-indigo-600", |
| behavior: "Compressed and encrypted customer data (filename: taobaodata.tar.gz.enc) transmitted via DNS tunnel to alibaba-bas.com", |
| defenses: "Full Traffic Threat Analysis", |
| alerts: [ |
| { |
| severity: "critical", |
| message: "Abnormal data transfer | Protocol: DNS TXT records | Target domain: xyz.attacker[.]com | Data volume: 142MB (500% above threshold)" |
| } |
| ], |
| forensic: [ |
| "Data file created: /tmp/taobaodata.tar.gz.enc", |
| "DNS queries to xyz.attacker[.]com (TXT records)", |
| "Data transfer rate: 18.5KB per query", |
| "Total exfiltrated: 142MB in 8,234 DNS requests" |
| ] |
| } |
| ]; |
| |
| |
| const timelineContainer = document.querySelector('.attack-flow-container .flex'); |
| |
| attackSteps.forEach((step, index) => { |
| const card = document.createElement('div'); |
| card.className = `attack-card w-64 flex-shrink-0 bg-white rounded-lg border border-gray-200 overflow-hidden cursor-pointer transition-all duration-300 ${index === 0 ? 'active border-l-4 border-red-500' : ''}`; |
| card.innerHTML = ` |
| <div class="p-5"> |
| <div class="flex items-center justify-between mb-3"> |
| <div class="flex items-center"> |
| <div class="w-10 h-10 rounded-full ${step.color} flex items-center justify-center mr-3"> |
| <i class="fas fa-${step.icon}"></i> |
| </div> |
| <span class="text-xs font-semibold text-gray-500">PHASE ${step.id}</span> |
| </div> |
| <span class="severity-badge ${step.alerts[0].severity === 'critical' ? 'severity-critical' : step.alerts[0].severity === 'high' ? 'severity-high' : 'severity-emergency'} rounded-full">${step.alerts[0].severity.toUpperCase()}</span> |
| </div> |
| <h3 class="font-semibold text-gray-800 mb-2">${step.title}</h3> |
| <p class="text-sm text-gray-600 line-clamp-2 mb-3">${step.behavior}</p> |
| <div class="flex justify-between items-center"> |
| <span class="defense-badge bg-gray-100 text-gray-800 rounded-full">${step.defenses}</span> |
| <span class="text-xs text-gray-400">${step.id < 10 ? '0' + step.id : step.id}:00</span> |
| </div> |
| </div> |
| `; |
| |
| card.addEventListener('click', () => { |
| |
| document.querySelectorAll('.attack-card').forEach(c => c.classList.remove('active', 'border-l-4', 'border-red-500', 'border-yellow-500', 'border-green-500', 'border-blue-500', 'border-purple-500', 'border-pink-500', 'border-indigo-500')); |
| card.classList.add('active', 'border-l-4'); |
| |
| |
| if (step.color.includes('red')) card.classList.add('border-red-500'); |
| else if (step.color.includes('yellow')) card.classList.add('border-yellow-500'); |
| else if (step.color.includes('green')) card.classList.add('border-green-500'); |
| else if (step.color.includes('blue')) card.classList.add('border-blue-500'); |
| else if (step.color.includes('purple')) card.classList.add('border-purple-500'); |
| else if (step.color.includes('pink')) card.classList.add('border-pink-500'); |
| else if (step.color.includes('indigo')) card.classList.add('border-indigo-500'); |
| |
| |
| const detailsContainer = document.getElementById('attack-details'); |
| detailsContainer.innerHTML = ` |
| <div> |
| <div class="flex items-center mb-6"> |
| <div class="w-12 h-12 rounded-full ${step.color} flex items-center justify-center mr-4"> |
| <i class="fas fa-${step.icon} text-xl"></i> |
| </div> |
| <div> |
| <h3 class="text-xl font-semibold text-gray-800">${step.title}</h3> |
| <p class="text-sm text-gray-500">Attack Phase ${step.id}</p> |
| </div> |
| </div> |
| |
| <div class="mb-6"> |
| <h4 class="font-medium text-gray-700 mb-3">Attack Behavior</h4> |
| <div class="bg-gray-50 p-4 rounded-lg text-sm text-gray-700">${step.behavior}</div> |
| </div> |
| |
| <div class="mb-6"> |
| <h4 class="font-medium text-gray-700 mb-3">Triggered Defenses</h4> |
| <div class="flex items-center"> |
| <span class="defense-badge bg-gray-100 text-gray-800 rounded-full mr-2">${step.defenses}</span> |
| <span class="text-xs text-gray-500">Detected at ${step.id < 10 ? '0' + step.id : step.id}:00</span> |
| </div> |
| </div> |
| |
| <div class="mb-6"> |
| <h4 class="font-medium text-gray-700 mb-3">Security Alerts</h4> |
| <div class="space-y-3"> |
| ${step.alerts.map(alert => ` |
| <div class="p-3 rounded-lg ${alert.severity === 'critical' ? 'bg-red-50 border border-red-100' : alert.severity === 'high' ? 'bg-yellow-50 border border-yellow-100' : 'bg-orange-50 border border-orange-100'}"> |
| <div class="flex items-start"> |
| <div class="flex-shrink-0 mt-0.5"> |
| <i class="fas fa-${alert.severity === 'critical' ? 'exclamation-triangle text-red-500' : alert.severity === 'high' ? 'exclamation-circle text-yellow-500' : 'exclamation text-orange-500'}"></i> |
| </div> |
| <div class="ml-3"> |
| <div class="text-sm font-medium text-gray-800">${alert.message}</div> |
| </div> |
| </div> |
| </div> |
| `).join('')} |
| </div> |
| </div> |
| |
| <div> |
| <h4 class="font-medium text-gray-700 mb-3">Forensic Evidence</h4> |
| <div class="space-y-2"> |
| ${step.forensic.map(item => ` |
| <div class="flex items-start text-sm"> |
| <div class="flex-shrink-0 mt-1.5 mr-2"> |
| <div class="w-1.5 h-1.5 rounded-full bg-gray-400"></div> |
| </div> |
| <div class="text-gray-700">${item}</div> |
| </div> |
| `).join('')} |
| </div> |
| </div> |
| </div> |
| `; |
| |
| |
| const container = document.querySelector('.attack-flow-container'); |
| const cardLeft = card.offsetLeft; |
| const cardWidth = card.offsetWidth; |
| const containerWidth = container.offsetWidth; |
| container.scrollTo({ |
| left: cardLeft - (containerWidth / 2) + (cardWidth / 2), |
| behavior: 'smooth' |
| }); |
| }); |
| |
| |
| timelineContainer.appendChild(card); |
| if (index < attackSteps.length - 1) { |
| const connector = document.createElement('div'); |
| connector.className = 'flex items-center'; |
| connector.innerHTML = '<div class="timeline-connector w-24"></div>'; |
| timelineContainer.appendChild(connector); |
| } |
| }); |
| |
| |
| document.getElementById('scroll-left').addEventListener('click', () => { |
| document.querySelector('.attack-flow-container').scrollBy({ |
| left: -200, |
| behavior: 'smooth' |
| }); |
| }); |
| |
| document.getElementById('scroll-right').addEventListener('click', () => { |
| document.querySelector('.attack-flow-container').scrollBy({ |
| left: 200, |
| behavior: 'smooth' |
| }); |
| }); |
| |
| |
| document.querySelector('.attack-card').click(); |
| </script> |
| <p style="border-radius: 8px; text-align: center; font-size: 12px; color: #fff; margin-top: 16px;position: fixed; left: 8px; bottom: 8px; z-index: 10; background: rgba(0, 0, 0, 0.8); padding: 4px 8px;">Made with <img src="https://enzostvs-deepsite.hf.space/logo.svg" alt="DeepSite Logo" style="width: 16px; height: 16px; vertical-align: middle;display:inline-block;margin-right:3px;filter:brightness(0) invert(1);"><a href="https://enzostvs-deepsite.hf.space" style="color: #fff;text-decoration: underline;" target="_blank" >DeepSite</a> - 🧬 <a href="https://enzostvs-deepsite.hf.space?remix=capta1n/bas3" style="color: #fff;text-decoration: underline;" target="_blank" >Remix</a></p></body> |
| </html> |