Get started

Evaluate Your Defense with Attack Simulations



1) Authenticate on the Web App

Access the app through the URL  https://app.blacknoise.co.  Enter your email and password, then click "Sign in".
Recommendation: Use 2-factor authentication for added security. You can either use an authentication app (recommended) or an email address to receive your one-time code.
If you forgot your password, click on “Forgot password?” on the login page, enter your email address, and wait for a confirmation link to reset your password.


2) Setup your environment

Follow these steps to prepare your simulations environment:
  • Deploy your Attack Vectors to execute the technical events (see  1) Deploy an Attack Vector )
  • Add your Target Systems to have full control over the scope (see  2) Add a Target System )


3) Launch Attack Simulations

To launch simulations, complete the following:
  • Choose a scenario based on the attack behaviors you want to reproduce (see  Scenarios )
  • Create a campaign from the scenario by defining the scope and options of the simulation. Include Windows, Linux, or macOS Target Systems previously configured for simulation of system commands (see  Create a campaign )


4) Analyze Data and Enhance Defenses

To enhance your security efficiency, consider the following steps:
  • Qualify detection and reaction associated with each event to assess your security efficiency (see  Event details (executions, recommendations & comments) )
  • Test yourself again by relaunching a new simulation with the same parameters to consistently monitor your detection and reaction capabilities.