forked from splunk/attack_range
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathattack_range.conf
29 lines (24 loc) · 1.08 KB
/
attack_range.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
[global]
log_path = attack_range.log
log_level = INFO
[range_settings]
key_name = attack-range-key-pair
ip_whitelist = ["0.0.0.0/0"]
win_password = myTempPassword123
private_key_path = ~/.ssh/id_rsa
[splunk_settings]
splunk_admin_password = changeme
splunk_url = https://www.splunk.com/page/download_track?file=7.3.2/linux/splunk-7.3.2-c60db69f8e32-Linux-x86_64.tgz&ac=&wget=true&name=wget&platform=Linux&architecture=x86_64&version=7.3.2&product=splunk&typed=release
splunk_binary = splunk-7.3.2-c60db69f8e32-Linux-x86_64.tgz
# s3 bucket where the Splunk TA's are located
s3_bucket_url = https://attack-range-appbinaries.s3-us-west-2.amazonaws.com
splunk_windows_ta = splunk-add-on-for-microsoft-windows_600.tgz
splunk_sysmon_ta = add-on-for-microsoft-sysmon_800.tgz
splunk_stream_ta = Splunk_TA_stream.zip
splunk_stream_app = splunk-stream_713.tgz
splunk_cim_app = splunk-common-information-model-cim_4130.tgz
splunk_escu_app = DA-ESS-ContentUpdate-v1.0.41.tar.gz
splunk_asx_app = Splunk_Analytic_Story_Execution-latest.tar.gz
[simulation]
simulation_engine = atomic_red_team
simulation_technique = ''