attack_range
BlueTeam.Lab
attack_range | BlueTeam.Lab | |
---|---|---|
12 | 2 | |
1,965 | 125 | |
2.3% | - | |
7.7 | 2.5 | |
14 days ago | 10 months ago | |
Jinja | Jinja | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
attack_range
-
Splunk core certification
My advice… Don’t rush. Study the material and get a good understanding of the fundamentals. Each certification builds on the previous ones. If Splunk is a path you want to pursue, build those fundamentals. Put in the reps in a lab. Download BOTS, attack range data sets. Take a look at Splunk & Machine Learning YouTube channel. His videos are fantastic and he maintains a GitHub repo so you can use the datasets to practice what you learned on the video.
- Is there any repository for sample raw audit logs for various software platforms?
- Need to setup AD lab for praticing..
-
Dataset I can test IDS/IPS tools against?
Somewhat related, but if you’re using splunk, you could use Splunk Attack Range which simulates attacks.
- learning splunk. is there a way to "play" with it?
-
Introducing Splunk Attack Range v2.0
hey I think you are looking at a older repo for the local attack_range, we have not maintained this .. the current Splunk Attack Range lives here: https://github.com/splunk/attack_range/
-
Anyone have experience building a Windows AD lab environment in Docker?
Since you mention your in-depth ELK workflow, have you tried DetectionLab or Splunk's Attack Range? If you just want a fully working AD domain set up with various hosts, you can spin up the Red Team Attack Lab and then hook in your own logging stuff after it's built.
-
Terraform and Ansible
This is a project I've contributed to at work. It's designed to launch & configure a lab environment for security researchers, but that's not too important. It has a python CLI that takes a configuration file. That config file determines what bits of Terraform and ansible are executed. The Terraform builds instances in AWS (or Azure) and all the associated bits, and then calls the ansible playbook to provision that type of host.
-
Cool security project using Splunk?
Attack range: https://github.com/splunk/attack_range
-
How-to build detection scenarios properly?
have a look at Splunk's Attack Range project, which automates Caldera and Atomic Red Team for these kinds of purposes. i think this might help you as you gauge visibility, rulesets, etc ... https://github.com/splunk/attack_range
BlueTeam.Lab
-
Good ways to set up a home lab running ELK?
There are some great ready-made ELK-based security distributions: HELK, Security Onion, Wazuh to only name a few (search for "blueteam lab"). Some food for thought: - https://github.com/op7ic/BlueTeam.Lab (AZ) - https://hausec.com/2021/03/04/creating-a-red-blue-team-home-lab/ - https://github.com/aboutsecurity/blueteam_homelabs - https://unicornsec.com/home/siem-home-lab-series-part-1 - https://github.com/cyberdefenders/DetectionLabELK
- Blue Team detection lab created with Terraform and Ansible.
What are some alternatives?
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
UltimateAppLockerByPassList - The goal of this repository is to document the most common techniques to bypass AppLocker.
red_team_attack_lab - Red Team Attack Lab for TTP testing & research
the_cyber_plumbers_handbook - Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
awesome-emulators-simulators - A curated list of software emulators and simulators of PCs, home computers, mainframes, consoles, robots and much more...
attack_range_local - Build a attack range in your local machine
fakernet - A framework for quickly creating internet-like services for labs, exercises, and research.
Awesome-Cybersecurity-Datasets - A curated list of amazingly awesome Cybersecurity datasets
BadBlood - BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.