Overview of RidgeBot’s Adversary Cyber Emulation
Emulate the adversary’s techniques
IT security controls are mechanisms used to prevent, detect and mitigate cyber threats and attacks. RidgeBot® ACE emulates the adversary by mimicking the likely attack paths and techniques to generates continuous assessment data to help identify security control failures, resolve structural weaknesses and enable security control optimization. RidgeBot® ACE has aligned itself with the MITRE ATT&CK framework and maps its assessment test scripts to MITRE ATT&CK tactics and techniques. This increases the visibility of potential attack vectors and improves the communication of security control measurements.
ACE Attack Simulation Scenarios
Endpoint Security
RidgeBot® Botlet simulates the behavior of malicious software or downloads malware signatures to validate
the security controls of the target endpoints.
Data Exfiltration
RidgeBot® Botlet simulates the unauthorized movement of data from your server—for example, personal data, financial, confidential, software source codes, and more.
Active Directory Information Recon
RidgeBot® Botlet simulates an attacker to gather useful resources in Windows Active Directory for elevated
privilege, persist, and plundering information.
Measuring Security Control’s Effectiveness with RidgeBot® ACE
Assessment Means: Botlet
Botlet is a software agent that can simulate real-world cyber-attacks without any real harm or impact for customer IT environment.
Assessment Test Script
A group of scripted behaviors carried out by Botlet to simulate a specific cyber-attack or to validate the security controls.
Key Measurement: Block Rate
The ratio of blocked scripts vs all assessment scripts executed during a RidgeBot® ACE testing.
Download a Sample RidgeBot® ACE Test Report
Measuring Data Exfiltration Effectiveness with RidgeBot ACE
RidgeBot® ACE provides descriptions and mitigation suggestions for un-blocked assessment tests
Validate Security Control Effectiveness
- Overall Block Rate Trend
- Block Rate per Target
- Result Overview per Threat Group
- Result Overview per MITRE ATT&CK Tactic
- Result Overview per MITRE ATT&CK Technique
ACE Risk Assessment result with higher block rate indicates better security control in customer IT environment.
Four ways to learn about RidgeBot®
Helpful Resources


Please complete the form to download the OWASP report.