Questions & Answers from the Splunk Attack Range Tech Talk: Q. I manage ES and implement correl searches, including tuning and devising filtering etc. I would like to add a step where I deliberately 'oneshot' an attack dataset relevant to each rule to test that the notable fires. Attack Range looks excessive for this purpose. Is there simpler Splunk app or tool that would help me organize and manage 'oneshot' testing of my implemented correlations? A. I think you could use the replay_attack python script for this purpose. You don't need to build a lab environment with the Attack Range to use the python script. However, you have to make sure that the attack data we have available matches the schema you are using. Q. This would probably be a major re-engineering project but what would be the feasibility of "injecting" a backup of your own AD using a local version of the range install vs using the AD that's included with the range? A. W e allow folks to bring their own Splunk instance, but never consider a BYO AD instance, if you open a Github issue with this request we can easily triage it and consider it for a future version. Q. Is it AWS only, or could one build it in VirtualBox (locally)? A. version 3.0 now on the repo supports local https://attack-range.readthedocs.io/en/latest/Attack_Range_Local.html Q. Which one do you prefer, PurpleSharp or ART? A. I think they serve different purposes. We may use one or the other depending on the requirement. The next demo will give you a better idea Q. Looking at this python script, does it essentially perform a 'oneshot' of events into Splunk? A. Pretty much. It uses the previously generated dataset and uses Splunks API to push the dataset Visit Splunk Threat Research Team (STRT) to learn more.
... View more