<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Attack Range 3.0 in Security</title>
    <link>https://community.splunk.com/t5/Security/Splunk-Attack-Range-3-0/m-p/673611#M17538</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/263171"&gt;@Sharath22&lt;/a&gt;&amp;nbsp;maybe, pls update how much you have configured the attack range, which things you have installed, did you try to simulate any attacks, etc.. thanks.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 09 Jan 2024 09:38:03 GMT</pubDate>
    <dc:creator>inventsekar</dc:creator>
    <dc:date>2024-01-09T09:38:03Z</dc:date>
    <item>
      <title>Splunk Attack Range 3.0</title>
      <link>https://community.splunk.com/t5/Security/Splunk-Attack-Range-3-0/m-p/673588#M17535</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello Team, as we delve into Splunk Attack Range 3.0, we're interested in understanding the MITRE ATT&amp;amp;CK tactics and techniques that can be simulated within this environment. If you have information on this, kindly share it with us. Thank you!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 06:32:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-Attack-Range-3-0/m-p/673588#M17535</guid>
      <dc:creator>Sharath22</dc:creator>
      <dc:date>2024-01-09T06:32:52Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Attack Range 3.0</title>
      <link>https://community.splunk.com/t5/Security/Splunk-Attack-Range-3-0/m-p/673611#M17538</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/263171"&gt;@Sharath22&lt;/a&gt;&amp;nbsp;maybe, pls update how much you have configured the attack range, which things you have installed, did you try to simulate any attacks, etc.. thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 09:38:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-Attack-Range-3-0/m-p/673611#M17538</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2024-01-09T09:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Attack Range 3.0</title>
      <link>https://community.splunk.com/t5/Security/Splunk-Attack-Range-3-0/m-p/688415#M17885</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Failing to Build Attack Range 3.0&lt;/STRONG&gt; on &lt;EM&gt;Linux Mint 21.2&lt;/EM&gt;&amp;nbsp; (ubuntu codename jammy)&lt;/P&gt;&lt;P&gt;I have been following installation instructions on &lt;EM&gt;&lt;A href="https://attack-range.readthedocs.io/en/latest/Attack_Range_Local.html" target="_blank"&gt;https://attack-range.readthedocs.io/en/latest/Attack_Range_Local.html&lt;/A&gt;&amp;nbsp; &lt;/EM&gt;for a attack range local install on linux&lt;/P&gt;&lt;P&gt;Attack range fails during the &lt;EM&gt;build process&lt;/EM&gt;&amp;nbsp; (python attack_range build)&lt;/P&gt;&lt;P&gt;&amp;lt;--output cut--&amp;gt;&lt;/P&gt;&lt;P&gt;ASK [phantom : Creates directory] *********************************************&lt;BR /&gt;changed: [ar-phantom-attack-range-key-pair-ar]&lt;/P&gt;&lt;P&gt;TASK [phantom : Copy Splunk SOAR to server] ************************************&lt;BR /&gt;&lt;FONT color="#FF00FF"&gt;[WARNING]: Error deleting remote temporary files (rc: 1, stderr: Could not&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF00FF"&gt;chdir to home directory /home/vagrant: Permission denied bash:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF00FF"&gt;/home/vagrant/.bashrc: Permission denied })&lt;/FONT&gt;&lt;BR /&gt;changed: [ar-phantom-attack-range-key-pair-ar]&lt;/P&gt;&lt;P&gt;TASK [phantom : prepare phantom install script without apps] *******************&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;fatal: [ar-phantom-attack-range-key-pair-ar]: UNREACHABLE! =&amp;gt; {"changed": false, "msg": "Failed to create temporary directory.In some cases, you may have been able to authenticate and did not have permissions on the target directory. Consider changing the remote tmp path in ansible.cfg to a path rooted in \"/tmp\", for more error information use -vvv. Failed command was: ( umask 77 &amp;amp;&amp;amp; mkdir -p \"` echo /home/vagrant/.ansible/tmp `\"&amp;amp;&amp;amp; mkdir \"` echo /home/vagrant/.ansible/tmp/ansible-tmp-1716446324.3823583-133581-59531706665728 `\" &amp;amp;&amp;amp; echo ansible-tmp-1716446324.3823583-133581-59531706665728=\"` echo /home/vagrant/.ansible/tmp/ansible-tmp-1716446324.3823583-133581-59531706665728 `\" ), exited with result 1", "unreachable": true}&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;PLAY RECAP *********************************************************************&lt;BR /&gt;ar-phantom-attack-range-key-pair-ar : &lt;FONT color="#00FF00"&gt;ok=2&lt;/FONT&gt; &lt;FONT color="#FFCC00"&gt;changed=2&lt;/FONT&gt; unreachable=1 failed=0 &lt;FONT color="#33CCCC"&gt;skipped=6&lt;/FONT&gt; rescued=0 ignored=0&lt;/P&gt;&lt;P&gt;Ansible failed to complete successfully. Any error output should be&lt;BR /&gt;visible above. Please fix these errors and try again.&lt;BR /&gt;2024-05-23 08:38:44,768 - ERROR - attack_range - vagrant failed to build&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2024 08:09:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-Attack-Range-3-0/m-p/688415#M17885</guid>
      <dc:creator>bchip</dc:creator>
      <dc:date>2024-05-23T08:09:42Z</dc:date>
    </item>
  </channel>
</rss>

