Skip to content

View Attack Paths

The Paths tab in the Attack Graph Explorer lists all calculated routes an attacker could take from entry points to critical assets. Each path represents a chain of exploitable relationships that, if followed, would allow an adversary to reach a target.

What Is an Attack Path

An attack path is a sequence of connected steps through the graph:

  1. Entry point: Where the attacker gains initial access. Typically an internet-facing resource with a vulnerability, an exposed service, or a compromised credential.
  2. Intermediate hops: Lateral movement through network connections, credential access, privilege escalation, IAM role assumption, or trust relationships.
  3. Target: The critical asset the attacker ultimately reaches. Examples include databases with sensitive data, key vaults, secrets, admin accounts, and crown jewel assets.

How Paths Are Found

AttackLens uses Yen's K-Shortest Paths algorithm with Dijkstra subroutines to find up to 50 paths (configurable). Paths are limited to a maximum of 8 hops and are deduplicated by path signature. The algorithm operates on edge weights, so it naturally favors paths where each step is easier to exploit.

Attack Paths List

The Paths tab displays a table of all discovered attack paths, sorted by risk. Each row shows:

ColumnDescription
Risk ScoreNormalized score from 0 to 100, with severity badge (Critical, High, Medium, Low)
ConfidenceConfirmed, Plausible, or Theoretical -- based on how many edges are backed by capability evidence
Entry PointThe node where the path starts (click to view node details)
TargetThe node where the path ends (click to view node details)
HopsNumber of steps in the path
Key TechniquesMITRE ATT&CK techniques used along the path

Sorting

By default, paths are sorted by:

  1. Confidence: Confirmed paths first, then Plausible, then Theoretical
  2. Risk Score: Highest score first within the same confidence level

Click any column header to change the sort order.

Severity Filter

Use the severity filter buttons above the table to show only paths of a specific severity:

  • All: Show all paths
  • Critical (score 70+) -- Red badge
  • High (score 50--69) -- Orange badge
  • Medium (score 30--49) -- Yellow badge
  • Low (score below 30) -- Blue badge

Path Risk Score

Each path receives an 8-factor decomposed risk score. The breakdown is visible when you click into a path detail:

FactorWeightWhat It Measures
ExposureHighHow exposed the entry point is (internet-facing, public IP, open ports)
PrivilegeHighHighest privilege level gained along the path (UserLevel through CloudAdmin)
CredentialMediumCredential access opportunities -- plaintext credentials, SSH keys, API keys along the path
Data SensitivityMediumClassification of the target asset (PII, financial, health, classified)
Path LengthNegativeShorter paths receive higher scores -- fewer hops means easier exploitation
Finding RiskMediumSecurity findings (policy violations) present on nodes along the path
Patch RiskMediumUnpatched vulnerabilities along the path
Config RiskLowMisconfigurations on nodes along the path

The factors are combined into a normalized score (0--100) and classified:

SeverityScore Range
Critical70 and above
High50 -- 69
Medium30 -- 49
LowBelow 30

Path Confidence

Confidence indicates how much of the path is backed by real evidence from the capability catalog:

ConfidenceProven Edge RatioInterpretation
Confirmed80% or moreThe path relies primarily on edges matched to known attack techniques. Each proven edge has a MITRE ATT&CK mapping and evidence string.
Plausible40% -- 79%A substantial portion of the path is evidence-backed, but some steps are inferred from network topology or structural relationships.
TheoreticalBelow 40%The path exists in the graph topology, but most steps are based on structural relationships rather than proven attack capabilities.

Focus on Confirmed Paths First

Confirmed paths have the strongest evidence backing. When triaging, prioritize Confirmed paths before Plausible ones. Theoretical paths may warrant investigation but could represent connectivity that is harder to exploit in practice.

Filtering Paths by Asset

To see only attack paths involving a specific asset:

  1. Use the asset search field above the paths table
  2. Type the asset name, hostname, or IP
  3. The table filters to show paths where the asset appears as an entry point, target, or intermediate hop

Alternatively, from the Assets page, click View Attack Paths on any asset to navigate directly to a filtered view.

Entry Points and Targets

Common Entry Points

Entry Point TypeWhy It Is an Entry Point
Internet-facing VMsDirectly reachable from the internet (public IP, open ports)
Exposed web applicationsWeb services listening on public-facing ports
Public storage bucketsStorage with anonymous or public read access
Compromised credentialsLeaked or weak credentials (API keys, access tokens)
VPN endpointsVPN gateways accessible from external networks

Common Targets

Target TypeWhy It Is a Target
DatabasesStore sensitive data (PII, financial records, health data)
Key Vaults / Secret StoresContain encryption keys, certificates, and secrets
Domain ControllersControl Active Directory -- compromising these means full domain control
Admin accountsHigh-privilege identities that can control the entire environment
Crown jewel assetsResources explicitly marked as critical by your organization

Next Steps

AttackLens - Continuous Exposure Management