Skip to content

A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

Notifications You must be signed in to change notification settings

rsfl/attack_range

 
 

Repository files navigation

Splunk Attack Range

Purpose

This lab has been designed with reproducability in mind. Its primary purpose is to allow the user to quickly build various systems (Workstations, Domain Controllers, *nix machines,etc) in a quick and reproducable manner

Developing

  • For proper installation you will need access to AttackIQ Community Git Lab. See Russ for access
  1. create virtualenv and install requirements: virtualenv -p python3 venv && source venv/bin/activate && pip install -r requirements.txt

  2. install pre-commit hooks pre-commit install

Running hosts

  1. cd windows_workstation jump into the host folder
  2. vagrant up bring up machine and provision per Vagrantfile settings and Ansible playbook
  3. vagrant provision (optionally) provision machine per ansible playbook

Docs

About

A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 44.9%
  • Ruby 31.9%
  • HCL 23.2%