Skip to content

Latest commit

 

History

History
79 lines (63 loc) · 2.02 KB

Attack_Range_GCP.md

File metadata and controls

79 lines (63 loc) · 2.02 KB

Attack Range GCP

Docker

We built a docker image which you can use to build and run the attack range. The image includes all needed binaries.

docker pull splunk/attack_range
docker run -it splunk/attack_range
gcloud auth application-default login
python attack_range.py configure

MacOS

Clone attack_range git repo to local machine:

git clone https://github.com/splunk/attack_range.git
cd attack_range

Install and configure Terraform:

brew update
brew install terraform
cd terraform/gcp && terraform init && cd ../..

Install the GCP CLI by follwoing this guide.

Install and run Poetry:

curl -sSL https://install.python-poetry.org/ | python -
poetry shell
poetry install

Configure Attack Range:

python attack_range.py configure

Once the configuration is complete, you can proceed to build and control your range here

Linux

Install the required packages:

apt-get update
apt-get install -y python3.10 git unzip python3-pip curl

Install and configure Terraform:

curl -s https://releases.hashicorp.com/terraform/1.9.8/terraform_1.9.8_linux_amd64.zip -o terraform.zip && \
unzip terraform.zip && \
mv terraform /usr/local/bin/

Clone attack_range git repo to local machine:

git clone https://github.com/splunk/attack_range.git
cd attack_range

Install the GCP CLI by follwoing this guide.

Install and run Poetry:

curl -sSL https://install.python-poetry.org/ | python -
poetry shell
poetry install
python attack_range.py configure

Once the configuration is complete, you can proceed to build and control your range here

Windows

We recommend using the Windows Subsystem for Linux (WSL). You can find a tutorial here. After installing WSL, you can follow the steps described in the Linux section.