Introducing Attack Range v3.0

Security Splunk Threat Research Team
The Splunk Threat Research Team (STRT) is happy to release v3.0 of the Splunk Attack Range.

Splunk Attack Range is an open source project that allows security teams to spin up a detection development environment to emulate adversary behavior and use the generated telemetry data to build detections in Splunk. This blog highlights the new features introduced in version 3.0 to help build resilient, high-quality detections.

Splunk Attack Range

The Splunk Attack Range provides the following capabilities for detection engineering:

What’s New?

Optimized Build Process

We optimized the build time of Attack Range from 30 minutes to 5 minutes by using pre-built images which were generated with the tool Packer. Packer standardizes and automates the process of building Golden images which are templates for virtual machines. Previously, building an Attack Range with a Splunk Server and a Windows Server took around 30 minutes every time. By introducing Packer to pre-build images, the build time of Attack Range is reduced to 5 minutes or less. Generating the pre-built images takes around 20 minutes per server, which only needs to be performed once. Afterwards, you can build Attack Ranges within 5 minutes.

Related Articles

Reduce Operational Complexity with Splunk SOAR Logic Loops
Security
2 Minute Read

Reduce Operational Complexity with Splunk SOAR Logic Loops

Learn about the logic loops feature introduced in Splunk SOAR version 6.2 and how you can implement them in your own use cases and playbooks.
Splunk Enterprise Security: Built to Empower Every SOC Analyst
Security
5 Minute Read

Splunk Enterprise Security: Built to Empower Every SOC Analyst

Announcing a transformative update to Splunk Enterprise Security (ES) with 8.2: An AI-powered SecOps platform designed to unify and accelerate threat detection, investigation, and response (TDIR) in one seamless experience.
Splunk SOAR Playbooks: GCP Unusual Service Account Usage
Security
4 Minute Read

Splunk SOAR Playbooks: GCP Unusual Service Account Usage

In this new Splunk SOAR Playbook, we'll show how a Splunk Enterprise search can trigger automated enrichment, an analyst prompt, and rapid response actions to prevent damage caused by malicious account access.