Target "Export" Column Descriptions

  • affiliation_state: User set flag that permits filtering of entities deemed not related to you. All default UI views filter for affiliation_state = not specified.

  • applicability: Integer representing Target Temptation Applicability attribute. See: Temptation

  • attack_note: Target specific notes from the HOC Attack Operations team describing any observed weaknesses or characteristics of the target in question that would be of interest to an adversary.

  • authority: Whether or not this entity is related to you.

  • authority_distance: Distance to known related entity. Reconnassiance work is chosen based on how close an entity is to the authority boundary.

  • authority_override: The manual override that allows a human to decide on authority instead of the algorithm.

  • authorization_state: For Attack customers, wheter or not this target has been put in scope or "authorized" for attack activities.

  • banners_uuid: Subsequent API calls can use UUID to return detection's HTTP banner contents.

  • cert_uuid: Subsequent API calls can use UUID to return detection's certificate contents.

  • characteristic_tags: Set of Characteristics that have been applied to this target. See: Characteristics

  • characteristics_count: How many Characteristics in characteristics_tags -confidence: Integer representation of confidence that entity is related to you. Maps to UI display of Low less than 26, Medium=26-60, High=61-100.

  • cpe: NVD CPE String for this targets service.

  • criticality: Integer representing Target Temptation Criticality attribute. See: Temptation

  • description: Service description.

  • detection_relevance: Internal Use

  • enumerability: Integer representing Target Temptation Enumberability attribute. See: Temptation

  • exploitability: Integer representing Target Temptation Exploitability attribute. See: Temptation

  • first_seen: Timestamp of when target was first discovered.

  • headers_uuid: Subsequent API calls can use UUID to return detection's HTTP hearder contents.

  • hostname: Hostname of target.

  • hostname_id: UUID of hostname that can be used in subsequent API calls to return hostname details.

  • id: Target's UUID.

  • impact_score: Randori allows users the ability to assign Impact to their assets to facilitate in maintaining a proper asset inventory. This is the current set impact score. (None, Low, Medium, High). See: Impact

  • ip: IP Address of target.

  • ip_id: UUID of IP that can be used in subsequent API calls to return IP details.

  • last_seen: Timestamp of when target was last seen.

  • lens_id: Metadata about where the platform discovered the asset from. For external assets (aka Public) this will be a UUID of all 0's. For internal assets, this will be a UUID computed based on various implant metadata.

  • lens_view: Public for assets that can be discovered on the open internet and internal for assets that can only be discovered with internal access.

  • name: Service Name

  • org_id: UUID of this Organization that can be used in subsequent API calls to return additional org details.

  • path: Patch part of URL to this enity. For example /index.html/ or /login/

  • perspective_name: See lens_view

  • poc_email: Internal Use

  • poc_id: Internal Use

  • port: Port number of the service.

  • post_exploit: Integer representing Target Temptation Post Exploit Potential attribute. See: Temptation

  • priority_impact_factor: Internal Use (how the set Impact on a Target modifies the overall priority_score)

  • priority_score: Overall risk classification is set as a Priority score. This is number mapped to UI as:

    • High Priority: > 29.98

    • Medium Priority: > 20 and <= 29.98

    • Low Priority: <= 20

  • priority_status_factor: Internal Use (how the set Status on a Target modifies the overall priority_score)

  • priority_tags_factor: Internal Use (how the Characteristics on a Target modify the overall priority_score)

  • private_weakness: The measure of available exploits in non-public circles, as well as factors such as cost of exploits for those weaknesses.

    Note: The Randori UI computes the CEILING of public_weakness & private_weakness and uses this for the displayed exploitability factor in Target Temptation.
  • protocol: Service's detected transport protocol such as tcp

  • public_weakness: The measure of public disclosures around this Service as well as the implications of known weaknesses within the Service.

    Note: The Randori UI computes the CEILING of public_weakness & private_weakness and uses this for the displayed exploitability factor in Target Temptation.
  • Randori_notes: Randori HOC notes about this service.

  • reference: Full URL string.

  • researc: Integer representing Target Temptation Research Potential attribute. See: Temptation

  • screenshot_uuid: UUID of Screenshot object that can be used in subsequent API calls to return the screenshot.

  • service_id: UUID of Service that can be used in subsequent API calls to return service details.

  • status: Status is used to indicate the current state of work surrounding a given target. See: Status

  • target_confidence: Confidence is computed based on Authority and Authority Distance and indicates how strongly the Randori platform believes a particular asset "belongs" to the client.

  • target_first_seen: Date target was created.

  • target_num_detections: Number of detections for target. A Detection describes how an attacker could navigate to a specific Target. See: Targets

  • target_temptation: Temptation provides a realistic adversarial assessment of the likelihood Target will be attacked.

    • Critical: 40-100

    • High: 30-39

    • Medium: 15-29

    • Low: 0-14

    • In Review: null

  • tech_category: Technology category of service. See: Temptation

  • temptation_last_modified: The date that the service temptation was last modified (targets are concrete instances of service abstractions).

  • thumbnail_uuid: UUID of screenshot thumbnail that can be used in subsequent API calls to return the thumbnail image.

  • user_tags: Set of user defined tags applied to this target.

  • validated_vulnerabilities: A list of CVEs or Default Credential Testing activities that have been successful for this Target.

  • validated_vulnerabilities_count: A count of the CVEs or Default Credential Testing activities that have been successful for this Target.

  • vendor: Service vendor such as Microsoft or Cisco

  • version: If it exists, the enumerated version number of the discovered service.