Get started



Evaluate Your Defense Posture with Attack Simulations



1️⃣ Authenticate on the Web App

Access the platform at  https://app.blacknoise.co , enter your email address and password, then select Sign in.
Recommendation: Enable two-factor authentication for stronger account security. You may use an authenticator app (recommended) or receive a one-time code by email.
If you forgot your password, click on Forgot password? on the login page, enter your email address, and wait for a confirmation link to reset your password.
Hint: Users with an Admin role can create new accounts and generate API tokens to automate the use of BlackNoise.


2️⃣ Prepare your environment

Before launching simulations, configure the required components:
  • Deploy your Attack Vectors to execute the technical events. (See:  1) Deploy an Attack Vector  )
  • Add your Target Systems to define the exact scope of your simulations. (See:  2) Add a System Target  )


3️⃣ Launch Attack Simulations

To run a simulation:
  • Select a scenario that matches the attack behaviors you want to reproduce.
  • Create a campaign from that scenario by defining the scope and the simulation settingsInclude the previously configured Windows, Linux, or macOS systems used to simulate command execution. (See: Create a Campaign)
All these actions can be performed through the web interface or automated via the API.


4️⃣ Analyze Results and Strengthen Your Defenses

Improve your detection and response effectiveness by following these steps:
  • Qualify detection and response for each event to assess the performance of your controls. (See: Event Details – executions, recommendations & comments)
  • Repeat simulations with the same parameters to continuously monitor and track changes in your detection and response capabilities.
These operations can also be carried out through the web interface or automated using the API.