Current ThreatQ Version Filter
 

Exploit Targets

An Exploit Target is an identified vulnerability in a system, software, or network that can be targeted by tactics, techniques, and procedures (TTP).

Use the steps below to create, edit and delete an Exploit Target.  

Adding a Exploit Target

  1. Go to Create > Exploit Target.

    The Add Exploit Target dialog box opens.
    Add Exploit Target dialog box
  2. Enter a Name.
  3. Enter a Description in the field provided.
  4. Select a Source from the dropdown provided.

    You can also click the Add a New Source option if the desired source is not listed in the drop-down list. If administrators have enabled TLP view settings, you can select a TLP label for the new source in the dropdown list provided. See the Traffic Light Protocol (TLP) topic for more information on TLP schema.

  5. Select any Related Objects you need to link to the Exploit Target. This field is optional.
  6. Click Add Exploit Target.

Adding Context

See the About Object Details section and its topics for details on adding context to an object such as adding sources, attributes, and related objects.

Editing a Exploit Target

  1. Locate and click on the Exploit Action.

    The Exploit Target's detail page opens.
    Exploit Target details page

  2. Click on Edit next to the Exploit Target's name.

    The Edit Exploit Target dialog box opens.
    Edit Exploit Target dialog box

  3. Make the desired change to the Exploit Target's name and click Save Exploit Target.

Deleting a Exploit Target

  1. Locate and click on the Exploit Target.

    The Exploit Target's details page opens.
    Exploit Target details page

  2. Click on the Actions menu and select Delete Course of Action.

    A confirmation dialog box appears.
    Deletion Confirmation dialog box

  3. Click on Delete Course of Action.