This component runs the events. It is deployed on your network to execute offensive actions (events) according to the chosen scenario and based on the configured campaign technical settings.
You need to have at least one operational Attack Vector to execute a simulation. Follow those steps to setup one.
A) Prepare the Attack Vector installation
You need a computer with Docker to run a BlackNoise Attack Vector. This computer will be the host.
Computer specs
CPU: x86_64 or ARM architecture
RAM: 2 GB
Storage: 16 GB
Software specs
Linux OS (such as Debian, Ubuntu, RedHat, or Fedora; whether on a physical or virtual machine like VirtualBox)
Docker (Docker engine v27.0.0 and +)
Follow these steps to set up your environment:
Prepare a native Linux OS or install it within a virtual machine. This will enable you to effectively deploy an Attack Vector on a Windows computer, for example.
The Attack Vector will use the IP address of the host OS on which it is installed. You can therefore freely choose a configuration via DHCP or static address according to your needs for the host.
If the host OS has several network interfaces, make sure the default route is set for just one. Otherwise, this mistake stops the Attack Vector BlackNoise from working.
How to prepare a Linux Virtual machine to install the Attack Vector
Important: No protocol interruption. For the secure connection between the Attack Vector and the BlackNoise platform to be successfully established, the open flow must remain intact without any protocol break. In particular, intermediate devices must not decrypt TLS traffic from HTTPS connections, as this would prevent the secure end-to-end communication required for proper operation.
Once the host is ready, you can go to step B).
B) Install the Attack Vector
From from the Resources > Attack Vectors page, click the Create attack vector button in the top right
Provide a name (alias) for this Attack Vector
Add a caption...
Copy the docker command from the screen and paste it into the terminal of the previously deployed computer (the host) to execute it. You can also provide an HTTP PROXY to be used for this connection from the Attack Vector to the web app. Please refer to the FAQ to add this option within the following command (https://doc.blacknoise.co/p/ps6ZTNIhewUzS9/Untitled#5yRgILGUh2OIg1).
Add a caption...
The attack Vector shows up in the web app list. The container image is downloaded and started. Once the authentication between the Docker container and the BlackNoise web app is done, the Attack Vector is ready to use (ie. operational). This is shown by a green dot. It can now be used in an attack campaign.
This sketch cannot currently be displayed in exports
The deployment of the virtual Attack Vector (docker) is not working on Linux
If you have an error message such as:
permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock
Your user does not have the rights to execute some Docker commands. Add your user to the docker group:
sudousermod-aGdocker your-username
Please refer to our FAQ for technical details to ensure communication between Attack Vector and Target Systems