Splunk Attack Range

Splunk Attack Range

#Security Testing#Offensive Security

Interactive online malware sandbox for real-time analysis and threat intelligence

Visit Website

Understanding the Splunk Attack Range

The Splunk Attack Range is a project that is open-source and is actively maintained by the Splunk Threat Research Team.

It builds instrumented cloud and local environments, simulates attacks, and forwards data to a Splunk instance

It creates instrumented environments both in the cloud and locally, simulates various attack scenarios, and sends the collected data to a Splunk instance.

This environment can then be utilized for effective detection development and testing

This environment can then be used to develop and test the effectiveness of detections. Purpose ���� The Attack Range is a detection development platform that addresses three primary challenges in detection engineering: It enables users to quickly set up a small lab infrastructure that closely resembles a production environment.

The Attack Range: Simulating Attacks for Real Data

The Attack Range simulates attacks by utilizing various engines, such as Atomic Red Team or Caldera, to produce authentic attack data.

Seamless Integration into CI/CD Pipelines

It integrates seamlessly into any Continuous Integration / Continuous Delivery (CI/CD) pipeline, allowing for the automation of the detection rule testing process.

Installation ���� Using Docker Attack Range in AWS

To begin, use the following commands to pull and run the Docker image for the Attack Range: 1. Pull the Docker image: ``` docker pull splunk/attack_range ``` 2. Run the Docker container interactively: ``` docker run -it splunk/attack_range ``` 3. Configure AWS: ``` aws configure ``` 4. Finally, run the configuration script: ``` python attack_range.py configure ``` If you prefer to install directly on Linux or MacOS, please follow the provided instructions. Architecture ���� The deployment of Attack Range consists of: Windows