# Exploit Graph

The Attack Dashboard contains the "Exploit Graph" which is a dynamic visualization that maps out the relationships between discovered entities and potential attack paths. It provides a clear view of how vulnerabilities can be exploited across your network, helping you understand the full scope of your security posture.

<figure><img src="https://232193438-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FwolEZzMm5QD9NoFKutSj%2Fuploads%2F1VUDmMIs6mNWGAtHwp9c%2Fimage.png?alt=media&#x26;token=7b4ed1ae-96c0-4fc3-9c77-5418e0da394a" alt="Exploit Graph"><figcaption><p>Exploit Graph</p></figcaption></figure>

**Understanding the Exploit Graph**

* **Entities:** Represent the various assets discovered during assessments, such as domains, WebPages, and Subnets.
* **Relations:** Illustrate the connections and interactions between entities, showing how an attacker might move through the network.
* **Attack Paths:** Each branch in the exploit graph is an Attack Path. It highlight potential routes an attacker could take to exploit vulnerabilities and reach critical assets.

#### Graph Actions

* **Click a node**: View details, expand, or follow paths
* **Expand**: See connected nodes and vulnerabilities
* **Search**: Use the search bar to find entities by name, URL, or type
