Skip to content

Latest commit

 

History

History
87 lines (71 loc) · 1.96 KB

Attack_Range_AWS.md

File metadata and controls

87 lines (71 loc) · 1.96 KB

Attack Range AWS

Docker

We built a docker image which you can use to build and run the attack range. The image includes all needed binaries.

docker pull splunk/attack_range
docker run -it splunk/attack_range
aws configure
python attack_range.py configure

MacOS

Clone attack_range git repo to local machine:

git clone https://github.com/splunk/attack_range.git
cd attack_range

Install and configure Terraform:

brew update
brew install terraform
cd terraform/aws && terraform init && cd ../..

Install the AWS CLI:

brew install awscli
aws configure

Install and run Poetry:

curl -sSL https://install.python-poetry.org/ | python -
poetry shell
poetry install

Configure Attack Range:

python attack_range.py configure

Once the configuration is complete, you can proceed to build and control your range here

Linux

Install the required packages:

apt-get update
apt-get install -y python3.10 git unzip python3-pip curl

Install and configure Terraform:

curl -s https://releases.hashicorp.com/terraform/1.9.8/terraform_1.9.8_linux_amd64.zip -o terraform.zip && \
unzip terraform.zip && \
mv terraform /usr/local/bin/

Clone attack_range git repo to local machine:

git clone https://github.com/splunk/attack_range.git
cd attack_range

Install the AWS CLI:

apt-get install -y awscli
aws configure

Install and run Poetry:

curl -sSL https://install.python-poetry.org/ | python -
poetry shell
poetry install
python attack_range.py configure

Once the configuration is complete, you can proceed to build and control your range here

Windows

We recommend using the Windows Subsystem for Linux (WSL). You can find a tutorial here. After installing WSL, you can follow the steps described in the Linux section.