Introducing Attack Range v3.0

Security Splunk Threat Research Team
The Splunk Threat Research Team (STRT) is happy to release v3.0 of the Splunk Attack Range.

Splunk Attack Range is an open source project that allows security teams to spin up a detection development environment to emulate adversary behavior and use the generated telemetry data to build detections in Splunk. This blog highlights the new features introduced in version 3.0 to help build resilient, high-quality detections.

Splunk Attack Range

The Splunk Attack Range provides the following capabilities for detection engineering:

What’s New?

Optimized Build Process

We optimized the build time of Attack Range from 30 minutes to 5 minutes by using pre-built images which were generated with the tool Packer. Packer standardizes and automates the process of building Golden images which are templates for virtual machines. Previously, building an Attack Range with a Splunk Server and a Windows Server took around 30 minutes every time. By introducing Packer to pre-build images, the build time of Attack Range is reduced to 5 minutes or less. Generating the pre-built images takes around 20 minutes per server, which only needs to be performed once. Afterwards, you can build Attack Ranges within 5 minutes.

Related Articles

All the Proxy(Not)Shells
Security
7 Minute Read

All the Proxy(Not)Shells

The Splunk Threat Research Team walks through exploitation of ProxyShell and ProxyNotShell using MetaSploit, and hunts through data in Splunk to showcase different avenues for defenders to identify malicious activity.
Staff Picks for Splunk Security Reading August 2022
Security
2 Minute Read

Staff Picks for Splunk Security Reading August 2022

Check out the latest staff picks from our Splunk security experts, featuring a list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Matching AI Strengths to Blue Team Needs
Security
6 Minute Read

Matching AI Strengths to Blue Team Needs

Discover how AI and Large Language Models (LLMs) enhance cybersecurity operations for Blue Teams.