BitDam Blog

How to Set Up a Breach and Attack Simulation
Roy Rashti
Roy Rashti
4 minutes & 2 seconds read · September 12, 2019

How to Set Up a Breach and Attack Simulation

How easy is it for a threat actor to get into your network? Well, many IT security pros will have to reluctantly admit that they don’t really know how well their security is actually working.

Until recently, enterprise security teams had limited tools for assessing the potential damage of a cyberattack. Even with regular pentesting, vulnerability assessments, security audits, red team testing, and threat hunting, it isn’t always possible to get an ongoing and comprehensive picture of your organization’s overall security posture. That’s why the new generation of security tools, incorporating Breach and Attack Simulation (BAS) technology, were developed.

BAS technology tests a network’s cyber defenses by simulating cyber attacks. It deploys hacker breach methods and tactics in a business context, eliminating guesswork from a network’s cybersecurity defenses. BAS solutions are fully automated and ensure that cybersecurity controls are working as expected by continually monitoring networks and systems.

What are the Advantages of BAS?

Modern enterprise networks are complicated. While manual penetration testing and threat assessments have their place, an automated BAS that looks at your network from the hacker perspective is invaluable in assessing the effectiveness of an organization’s security posture.

By simulating a real attack on a network and deploying threat actor tactics to breach an organization’s defenses, BAS technology continually monitors and tests the robustness of security controls. It doesn’t sleep, rest or stop, unlike other security testing methods and threat assessment techniques that typically rely on manual methods, and are deployed to identify vulnerabilities in a specific timeframe. BAS, on the other hand, continuously highlights critical exposures in a network, ensuring zero time-lapses between testing.

Cyber attack simulation can provide actionable and prioritized remediation to address any identified weaknesses. By having a clear set of priorities, your security team can patch the critical vulnerabilities first, before moving on to lower priority maintenance issues.

Enter BitDam’s Email-Centric Breach and Attack Simulation

What if there was a BAS tool that could help you assess how vulnerable your organization is to email cyberattacks and have a centralized dashboard that helps you gain full visibility into your results? Moreover, what if it was capable of identifying the most sophisticated and camouflaged attacks that bypass most other security solutions?

  • BitDam Breach & Attack Simulation identifies the most sophisticated attacks that are out there, including the ones that might show up next
  • BitDam’s dashboard, helps users gain visibility into the Breach & Attack Simulation results within a few minutes of signing in
  • View the current level of email protection, the types of cyberattacks to which you are vulnerable, and the type of threats that you are protected from
  • BitDam’s BAS tool is easy, and fast to set up; it only needs a single email address to successfully run an attack simulation on an entire organization
  • And the best part? BitDam’s Breach & Attack Simulation is a free tool that offers the most advanced email malware simulation IP across the industry

How to Set Up BitDam’s BAS Tool

BitDam’s BAS tool is easy to set up in just a few simple steps.


      1. Pick an email address that you would like to simulate an attack on.
      2. Configure the forwarding rule in your inbox from the configuration screen.
      3. Hit the ‘Play’ button, and BAS tool will start working.
      4. The attack simulation tool will send out emails containing malicious attachments from different attack categories and risk levels, including:
      • Sandbox evasion techniques: malware and malicious programs can recognize if it’s inside a sandbox and won’t execute their malicious code until they’re outside of the controlled environment.
      • Formula injection: embedding untrusted input inside CSV files, and the malicious code will execute when the CSV file is opened by the user
      • Obfuscation techniques: a technique that tries to obscure the presence of malware in the system by making binary and textual data unreadable or hard to understand
      • Process launch: attacks that base their initial malicious execution on launching processes outside the application space
      1. Once the simulation is complete, a short overview of your security posture will be given along with the option to view dashboard where you can access a more detailed report.

How BitDam’s Email-Centric BAS Tool Can Help

Malware and attack methods are constantly evolving, and it is extremely difficult for security teams to ensure ongoing protection. That’s why having a BAS tool that simulates attacks automatically and evaluates security gaps quickly and continuously, is invaluable.

BitDam changes the way cybersecurity solutions operate. BitDam’s Email-Centric Breach & Attack Simulation lets you assess your vulnerability to email based cyber attacks.The tool features easy, fast deployment with no need to modify existing processes, policies, or rules, and provides full visibility and actionable information on a centralized, easy to read dashboard.

Try it now for free!

Schedule a Demo

Enter your email to get a free trial invitation