We built a docker image which you can use to build and run the attack range. The image includes all needed binaries.
docker pull splunk/attack_range
docker run -it splunk/attack_range
aws configure
python attack_range.py configure
Clone attack_range git repo to local machine:
git clone https://github.com/splunk/attack_range.git
cd attack_range
Install and configure Terraform:
brew update
brew install terraform
cd terraform/aws && terraform init && cd ../..
Install the AWS CLI:
brew install awscli
aws configure
Install and run Poetry:
curl -sSL https://install.python-poetry.org/ | python -
poetry shell
poetry install
Configure Attack Range:
python attack_range.py configure
Once the configuration is complete, you can proceed to build and control your range here
Install the required packages:
apt-get update
apt-get install -y python3.10 git unzip python3-pip curl
Install and configure Terraform:
curl -s https://releases.hashicorp.com/terraform/1.9.8/terraform_1.9.8_linux_amd64.zip -o terraform.zip && \
unzip terraform.zip && \
mv terraform /usr/local/bin/
Clone attack_range git repo to local machine:
git clone https://github.com/splunk/attack_range.git
cd attack_range
Install the AWS CLI:
apt-get install -y awscli
aws configure
Install and run Poetry:
curl -sSL https://install.python-poetry.org/ | python -
poetry shell
poetry install
python attack_range.py configure
Once the configuration is complete, you can proceed to build and control your range here
We recommend using the Windows Subsystem for Linux (WSL). You can find a tutorial here. After installing WSL, you can follow the steps described in the Linux section.