https://github.com/splunk/attack_range_cloud
Attack Range to test detection against nativel serverless cloud services and environments
https://github.com/splunk/attack_range_cloud
Last synced: 7 months ago
JSON representation
Attack Range to test detection against nativel serverless cloud services and environments
- Host: GitHub
- URL: https://github.com/splunk/attack_range_cloud
- Owner: splunk
- License: apache-2.0
- Created: 2020-07-29T02:38:39.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2021-09-08T00:39:06.000Z (over 4 years ago)
- Last Synced: 2024-04-15T02:58:36.996Z (about 2 years ago)
- Language: Python
- Size: 735 KB
- Stars: 33
- Watchers: 22
- Forks: 10
- Open Issues: 8
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Splunk Cloud Attack Range βοΈ
## Purpose π‘
The Cloud Attack Range is a detection development platform, which solves three main challenges in detection engineering. First, the user is able to build quickly a small lab infrastructure as close as possible to a cloud environment. Second, the Attack Range performs attack simulation using different engines such as [Atomic Red Team](https://github.com/redcanaryco/atomic-red-team) in order to generate real attack data.
## Building π·ββοΈ
Cloud Attack Range can be built is currently:
- **cloud-only**, Specifically simulate attacks against AWS
## Architecture π―
The Cloud Attack Range consists of:
- pre-configured Splunk server with AWS Cloudtrail logs and Kubernetes logs
- pre-configured Phantom server
- AWS Elastic Kubernetes Service with a Wordpress app and [Splunk Connect for Kubernetes](https://github.com/splunk/splunk-connect-for-kubernetes)
- integrated [Atomic Red Team](https://github.com/redcanaryco/atomic-red-team) cloud attacks

### Logging
The following log sources are collected from the machines:
- Cloudtrail logs (```index=aws```)
- Kubernetes logs (```index=kubernetes```)
- Kubernetes metrics (```index=kubernetes-metrics```)
- AWS Elastic Kubernetes Service logs (```index=aws sourcetype=aws:cloudwatchlogs```)
## Running πββοΈ
Follow [Getting Started](https://github.com/splunk/attack_range_cloud/wiki/Configure-Cloud-Attack-Range) to configure Cloud Attack Range.
Cloud Attack Range supports different actions:
- Build Cloud Attack Range
- Perform Cloud Attack Simulation
- Destroy Cloud Attack Range
- Stop Cloud Attack Range
- Resume Cloud Attack Range
### Cloud Attack Range Commands
- Configure your Cloud Attack Range .conf
```
- [x] python cloud_attack_range.py configure
```
### Cloud Attack Range Commands
- Build Cloud Attack Range
```
- [x] python cloud_attack_range.py build
```
### Perform Cloud Attack Simulation
[Work in Progress]
- Perform Cloud Attack Simulation by Mitre technique
```
python cloud_attack_range.py simulate -st T1136.003
```
### Destroy Cloud Attack Range
- Destroy Cloud Attack Range
```
python cloud_attack_range.py destroy
```
### Stop Cloud Attack Range
- Stop Cloud Attack Range
```
python cloud_attack_range.py stop
```
### Resume Cloud Attack Range
- Resume Cloud Attack Range
```
python cloud_attack_range.py resume
```
## Features π
- [Splunk Server](https://github.com/splunk/attack_range/wiki/Splunk-Server)
* Preconfigured with multiple TAs for field extractions
* Out of the box Splunk detections with Enterprise Security Content Update ([ESCU](https://splunkbase.splunk.com/app/3449/)) App
* Preinstalled Machine Learning Toolkit ([MLTK](https://splunkbase.splunk.com/app/2890/))
* Splunk UI available through port 8000 with user admin
* ssh connection over configured ssh key
- [Splunk Enterprise Security](https://splunkbase.splunk.com/app/263/)
* [Splunk Enterprise Security](https://splunkbase.splunk.com/app/263/) is a premium security solution requiring a paid license.
* Enable or disable [Splunk Enterprise Security](https://splunkbase.splunk.com/app/263/) in [cloud_attack_range.conf](cloud_attack_range.conf)
* Purchase a license, download it and store it in the apps folder to use it.
- [Splunk Phantom](https://www.splunk.com/en_us/software/splunk-security-orchestration-and-automation.html)
* [Splunk Phantom](https://www.splunk.com/en_us/software/splunk-security-orchestration-and-automation.html) is a Security Orchestration and Automation platform
* For a free development license (100 actions per day) register [here](https://my.phantom.us/login/?next=/)
* Enable or disable [Splunk Phantom](https://www.splunk.com/en_us/software/splunk-security-orchestration-and-automation.html) in [cloud_attack_range.conf](cloud_attack_range.conf)
- [Atomic Red Team](https://github.com/redcanaryco/atomic-red-team)
* Attack Simulation with [Atomic Red Team](https://github.com/redcanaryco/atomic-red-team)
* Uses Attack TTPs from [Cloud ATT&CK Mitre IDs](https://attack.mitre.org/matrices/enterprise/cloud/)
## Support π
Please use the [GitHub issue tracker](https://github.com/splunk/attack_range_cloud/issues) to submit bugs or request features.
If you have questions or need support, you can:
* Post a question to [Splunk Answers](http://answers.splunk.com)
* Join the [#security-research](https://splunk-usergroups.slack.com/archives/C1S5BEF38) room in the [Splunk Slack channel](http://splunk-usergroups.slack.com)
* If you are a Splunk Enterprise customer with a valid support entitlement contract and have a Splunk-related question, you can also open a support case on the https://www.splunk.com/ support portal
## Author
* [Patrick BareiΓ](https://twitter.com/bareiss_patrick)
* [Bhavin Patel](https://twitter.com/hackpsy)
* [Jose Hernandez](https://twitter.com/d1vious)
## License
Copyright 2020 Splunk Inc.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.