Network Topology

Network Topology Network topology visualization showing discovered infrastructure

Overview

The Network Topology view provides interactive visualization of the engagement's attack surface and compromise progression.

Views

Map View

Visual network diagram showing:

  • Targets: All discovered hosts and networks
  • Connections: Network relationships
  • Compromise Status: Color-coded by access level
  • Service Information: Ports and protocols
  • Pivot Chains: Lateral movement paths

Live View

Real-time operation monitoring:

  • Active operations
  • Current targets
  • Operation status
  • Recent activities

Visualization Features

Color Coding

Targets colored by status:

  • Green: Discovered, not compromised
  • Yellow: Compromised with user access
  • Red: Compromised with admin/root access
  • Gray: Out of scope
  • Blue: Currently active target

Node Information

Click target node to view:

  • IP address and hostname
  • Operating system
  • Running services
  • Compromise status
  • Access level
  • Credentials that work
  • Related findings

Connection Lines

Lines show relationships:

  • Solid lines: Direct network connectivity
  • Dashed lines: Pivot relationships
  • Thick lines: Active connections
  • Color: Matches target compromise status

Interactive Features

Zoom and Pan

Navigate the map:

  • Scroll: Zoom in/out
  • Click and drag: Pan around
  • Double-click: Center on node
  • Fit view: Auto-zoom to show all

Node Selection

Select targets:

  • Click: View target details
  • Right-click: Context menu
  • Shift-click: Multi-select
  • Drag: Move node position

Filtering

Show/hide elements:

  • By status: Show only compromised
  • By type: Hosts, networks, services
  • By network: Filter by subnet
  • By tag: Show specific categories

Layout Options

Auto-Layout

Automatic positioning:

  • Hierarchical: Tree structure
  • Force-directed: Physics simulation
  • Circular: Circular arrangement
  • Grid: Grid alignment

Manual Layout

Custom positioning:

  • Drag nodes to position
  • Save custom layouts
  • Apply to reports

Pivot Chain Visualization

Attack Path Highlighting

Show compromise progression:

  • Initial access point (highlighted)
  • Lateral movement path
  • Current position
  • Compromised targets along path

Multi-Path Display

When multiple attack paths exist:

  • Show all paths
  • Highlight shortest path
  • Display alternative routes
  • Compare path efficiency

Export and Reporting

Export Formats

Save topology as:

  • PNG: High-resolution image
  • SVG: Vector graphics
  • PDF: For reports
  • JSON: Data export

Report Integration

Topology appears in reports:

  • Executive summary (simplified)
  • Technical section (detailed)
  • Attack path visualization
  • Network diagrams

Use Cases

Initial Reconnaissance

Visualize discovered infrastructure:

  • Map attack surface
  • Identify high-value targets
  • Plan attack approach
  • Understand network segmentation

During Exploitation

Track compromise progression:

  • Show compromised systems
  • Plan lateral movement
  • Identify next targets
  • Avoid detection

Report Generation

Demonstrate attack capabilities:

  • Show network understanding
  • Visualize compromise scope
  • Illustrate attack paths
  • Support findings

Best Practices

  1. Update regularly: Keep topology current as targets discovered
  2. Accurate connections: Document actual network relationships
  3. Clear status: Mark compromise status accurately
  4. Export often: Save topology snapshots
  5. Use in reports: Visual representation is powerful
  6. Manual cleanup: Adjust layout for clarity

Known Issues

Map Tab: Currently shows infrastructure visualization instead of actual network topology. Future update will provide proper network graph showing targets, connections, and pivot chains.

Workaround: Use Live tab for operation monitoring. Network topology graph improvements are planned.