During an attack simulation, the Attack Vector establishes connections with each Target System to execute the events. Commands, programs, or tools are launched on the Target System to accurately replicate the attackers' behaviors.
A Target System can be a physical or virtual server or workstation running a Windows, Linux, or macOS operating system.
For the best results, Target Systems must be representative of the defenses in place, based on what is commonly used (EDR, antivirus, SIEM integration, etc.).
Target Systems list
Add a caption...
This list provides all information about your Target Systems:
Operating system
Name
IP address
Authentication type
Username
Last connection test status from an Attack Vector
If its assigned to a campaign
To facilitate the use of this list, several features are available:
Display order
Application of filters: OS, authentication type and if assigned or not
Search field
Create a Target System
Check the Setup section titled "2-Add a Target System" in this documentation for more information on what you need and how to configure such assets.
From the Resources > Target Systems page, click the Create a target system button in the top right corner.
Provide the essential information for your Target System by giving:
Name for identification in the BlackNoise application
The IP address
The OS type
You can then select from various authentication methods based on the chosen OS type. This authentication information is essential for the Attack Vector to connect to the Target System and execute the simulation events.
Add a caption...
For information regarding the campaign perimeter and the connection between Attack Vector and Target System, kindly consult our FAQ:
How does the Attack Vector connect to the Target Systems to execute the events?