Target systems

Manage all the Target Systems of the company

During an attack simulation, the Attack Vector establishes connections with each Target System to execute the events. Commands, programs, or tools are launched on the Target System to accurately replicate the attackers' behaviors.
A Target System can be a physical or virtual server or workstation running a Windows, Linux, or macOS operating system.
For the best results, Target Systems must be representative of the defenses in place, based on what is commonly used (EDR, antivirus, SIEM integration, etc.).


Target Systems list


This list provides all information about your Target Systems:
  • Operating system
  • Name
  • IP address
  • Authentication type
  • Username
  • Last connection test status from an Attack Vector
  • If its assigned to a campaign

To facilitate the use of this list, several features are available:
  • Display order
  • Application of filters: OS, authentication type and if assigned or not
  • Search field


Create a Target System

Check the Setup section titled "2-Add a Target System" in this documentation for more information on what you need and how to configure such assets.

    From the Resources > Target Systems page, click the Create a target system button in the top right corner.
    Provide the essential information for your Target System by giving:
  • Name for identification in the BlackNoise application
  • The IP address
  • The OS type
    You can then select from various authentication methods based on the chosen OS type. This authentication information is essential for the Attack Vector to connect to the Target System and execute the simulation events.

For information regarding the campaign perimeter and the connection between Attack Vector and Target System, kindly consult our FAQ:

How does the Attack Vector connect to the Target Systems to execute the events?

Need help to enable and test WMI access from BlackNoise Attack Vector to your Windows Target System?