Get started

Evaluate Your Defense with Attack Simulations



Authenticate on the Web App

Access the app through the URL  https://app.blacknoise.co.  Enter your email and password, then click "Sign in".
Recommendation: Use 2-factor authentication for added security. You can either use an authentication app (recommended) or an email address to receive your one-time code.
If you forgot your password, click on “Forgot password?” on the login page, enter your email address, and wait for a confirmation link to reset your password.


Setup

Follow these steps to prepare your simulations environment:

1. Deploy your Attack Vectors to execute the technical events

Resources > Attack Vectors (see  1) Deploy an Attack Vector )

2. Add your Target Systems to have full control over the scope

Resources > Target Systems (see  2) Add a Target System )


Launch Attack Simulations

To launch simulations, complete the following:

1. Choose a scenario based on the attack behaviors you want to reproduce

Threat Library > Scenarios (see  Scenarios )

2. Create a campaign from the scenario by defining the scope and options of the simulation

Include Windows, Linux, or macOS Target Systems previously configured for simulation of system commands
Resources > Target Systems (see  Create a campaign )


Analyze Data and Enhance Defenses

To enhance your security efficiency, consider the following steps:

1. Qualify detection and reaction associated with each event to assess your security efficiency

Attack campaigns > My campaigns > Simulations > Executions

2. Test yourself again with Control Tests to regularly monitor your detection and reaction capabilities

Attack campaigns > My campaigns > Simulations > Create a new control test
For further information, see  Create a Control Test  and  Simulations .