Current ThreatQ Version Filter
Exploit Targets
An Exploit Target is an identified vulnerability in a system, software, or network that can be targeted by tactics, techniques, and procedures (TTP).
Use the steps below to create, edit and delete an Exploit Target.
Adding a Exploit Target
- Go to Create > Exploit Target.
The Add Exploit Target dialog box opens.
- Enter a Name.
- Enter a Description in the field provided.
- Select a Source from the dropdown provided.
You can also click the Add a New Source option if the desired source is not listed in the drop-down list. If administrators have enabled TLP view settings, you can select a TLP label for the new source in the dropdown list provided. See the Traffic Light Protocol (TLP) topic for more information on TLP schema.
- Select any Related Objects you need to link to the Exploit Target. This field is optional.
- Click Add Exploit Target.
Adding Context
See the About Object Details section and its topics for details on adding context to an object such as adding sources, attributes, and related objects.
Editing a Exploit Target
- Locate and click on the Exploit Action.
The Exploit Target's detail page opens.
- Click on Edit next to the Exploit Target's name.
The Edit Exploit Target dialog box opens.
- Make the desired change to the Exploit Target's name and click Save Exploit Target.
Deleting a Exploit Target
- Locate and click on the Exploit Target.
The Exploit Target's details page opens.
- Click on the Actions menu and select Delete Course of Action.
A confirmation dialog box appears.
- Click on Delete Course of Action.