Randori Glossary

A

active entity

An entity that is connected, discoverable, or interactive in such a way that it has a function.

activity
An individual item of work conducted by the platform on an organization's attack surface.
affiliation

The status of an entity that is associated with an organization. This association occurs either automatically or if the entity is added to the platform manually or with integrations.

artifact
A piece of nonspecific data that results from a successful attempt to communicate with software, which is indicated by network addresses and protocols.
asset
An entity that represents the execution environment of where a source was installed.
attack action

A discrete activity that is performed in service of an attack-targeted objective, and can be categorized as either a recon attack action or an attack-targeted action.

An attack action is an intermediate step in a runbook. Attack actions allow the system to provide partial feedback on the progress of a runbook to the user.

attackability

A proprietary scoring mechanism that indicates the likelihood that an adversary acts against a target.

authority
A Boolean measure that indicates that your organization has ownership over a particular entity.
authorization
The ability to control what detections are considered in-scope for attack actions and automated testing activities.

B

business context

Information that an organization knows about an entity on the attack surface.

The user enters the business context in the impact and status fields. The business context influences the priority score.

C

characteristic

A trait or property that can be discovered about a target that is not specific to the application or service. Characteristics are used as input for the attackability and subsequent priority of a target.

connection
Customer-provided configuration information (IP address, URL, authentication material) that connects Randori to outside technology for sharing data by way of one or more integration workflows.

D

destination

A piece of metadata that describes where a runbook or attack action is dispatched to.

detection

A method that an attacker can use to find a specific target. Detections include at least an IP address and port number. Other examples of data that a detection includes are a path, a hostname, and related artifacts.

discovery path
The exact activities that are completed to find an entity.

E

entity
An asset, component, resource, person, construct, or object related to the attack surface of an organization. Entities are used as the starting points of reconnaissance activities to discover more entities and information. They include hostnames, IP addresses, networks, search terms, social entities, detections, and targets.
exploitability

A measurement of a service's susceptibility to weakness. Publicly released and privately held weaknesses and exploits are considered.

I

impact

The relative importance of an entity in the context of your business. See also business context.

implant

Software or hardware that is installed by the attack-targeted team that subverts the authentic function of a system. An implant can be installed to run commands, set up a VPN, push exploits, or otherwise conduct offensive activities.

O

origination

A piece of metadata that describes where a runbook or attack action is dispatched from.

P

perspective

The point of view from which entities are observable, and by which they can be grouped.

R

recipe

A workflow that runs a series of actions with the goal of sharing data between Randori and another tool.

redirector

An observable component of the Randori attack infrastructure. When connections occur to or from customer infrastructure to the Randori attack infrastructure, they interact with the Randori redirectors.

runbook

A set of user-facing attack targeted actions that further an attack objective by either increasing the information that is known about a target or creating a new perspective.

S

service

A specific software version that is seen in use on a customer’s attack surface.

social entity

A human being, or digital information about a human being, whom attackers can target due to affiliation with a particular organization. Social entities can include employees, contractors, or any individual with access to a company's digital systems.

source

A location where Randori conducts activities from. These locations include ephemeral nodes, internal agents, and attack-targeted implants.

T

target

A discoverable instance of a service.

temptation

A score applied to a service that rates how interesting that service is to a potential attacker. Temptation is computed without contextual information such as location, attacker objective, or knowledge of related services.

traffic source
The customer-observable IP address or source where Randori conducted an activity from.