Skip to content

Commit ff40a50

Browse files
committed
total_replay_tool
1 parent e97004e commit ff40a50

File tree

4 files changed

+200
-319
lines changed

4 files changed

+200
-319
lines changed
Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,7 @@
11
settings:
22
security_content_detection_path: ~/path/to/your/security_content/detections
3-
attack_range_dir_path: ~/path/to/your/attack_range
43
attack_data_dir_path: ~/path/to/your/attack_data
5-
attack_range_py_name: attack_range.py
64
output_dir_name : output
75
cache_replay_yaml_name : cache_replay_data.yml
86
replayed_yaml_cache_dir_name: replayed_yaml_cache
9-
python_interpreter_name: python3
10-
attack_range_version_on: False
11-
attack_data_version_on: True
127
debug_print: False

total_replay/readme.md

Lines changed: 16 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -9,37 +9,6 @@ This lightweight tool helps you make the most of Splunk’s [Security Content](h
99
## Installation
1010

1111
### MAC/LINUX:
12-
13-
**How to install TOTAL-REPLAY when working with Splunk Attack Range or Splunk Attack Data**
14-
15-
#### TOTAL-REPLAY IN SPLUNK ATTACK-RANGE REPO:
16-
---
17-
18-
1. Clone the Splunk Security Content github repo. We recommend to follow this steps [Security Content Getting Started](https://github.com/splunk/security_content).
19-
20-
2. We recommend following the instructions in the [Attack Range Getting Started](https://github.com/splunk/attack_range)
21-
guide. Once Attack Range is installed and its virtual environment (managed via Poetry) is activated, TOTAL-REPLAY is almost ready to use — you just need to configure it.
22-
23-
3. In total_replay->configuration->config.yml, add the folder path of the Splunk Attack Data repo and the detection folder path in Splunk Security Content.
24-
25-
```
26-
settings:
27-
security_content_detection_path: ~/path/to/your/security_content/detections
28-
attack_range_dir_path: ~/path/to/your/attack_range
29-
```
30-
31-
4. Enable the `attack_range_version_on` config setting in total_replay->configuration->config.yml:
32-
**NOTE: You can enable either `attack_range_version_on` or `attack_data_version_on` settings**
33-
```
34-
attack_range_version_on: True
35-
```
36-
37-
5. If you encounter problem with colorama python library just update it.
38-
```
39-
poetry update colorama
40-
```
41-
42-
#### TOTAL-REPLAY IN SPLUNK ATTACK-DATA REPO:
4312
---
4413

4514
1. Clone the Splunk Attack Data github repo. We recommend to follow this steps [Attack Data Getting Started](https://github.com/splunk/attack_data/).
@@ -90,6 +59,12 @@ attack_data_version_on: True
9059
export SPLUNK_HEC_TOKEN= <SPLUNK_HEC_TOKEN>
9160
```
9261
62+
10. Make sure HEC token is set to "Enabled" in Splunk server (Settings → Data Inputs → HTTP Event Collector).
63+
64+
11. Confirm the HEC listener port is enabled, typically 8088, using HTTPS.
65+
66+
12. Update your firewall settings to allow inbound connections on port 8088, otherwise your data sender will not be able to reach Splunk.
67+
9368
### Windows OS:
9469
9570
We recommend using the Windows Subsystem for Linux (WSL). You can find a tutorial [here](https://learn.microsoft.com/en-us/windows/wsl/install). After installing WSL, you can follow the steps described in the Linux section.
@@ -112,7 +87,16 @@ A. This tool accepts the following types of metadata as input:
11287
- **Splunk detection GUIDs**
11388
- **Analytic stories**
11489
115-
It then uses these inputs to identify and replay the attack data associated with them.
90+
It then uses these inputs to identify and replay the attack data associated with them.
91+
92+
Example A - Replay Attack Data via Splunk detection name:
93+
94+
```
95+
python3 total_replay.py -n '7zip CommandLine To SMB Share Path, CMLUA Or CMSTPLUA UAC Bypass'
96+
```
97+
98+
99+
116100
117101
B. For automation, you can also provide a simple .txt file.
118102
For example:

total_replay/test/test_names.txt

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
1-
wsreset_uac_bypass.yml
1+
PromptLock
2+
Amos Stealer
23
wscript_or_cscript_suspicious_child_process.yml
3-
windows_user_deletion_via_net.yml
4-
Windows User Disabled Via Net
5-
Windows Chromium Browser No Security Sandbox Process
4+
wmic_xsl_execution_via_url.yml
5+
windows_windbg_spawning_autoit3.yml
6+
Linux Auditd Change File Owner To Root
7+
f64579c0-203f-11ec-abcc-acde48001122
68
004e32e2-146d-11ec-a83f-acde48001122
79
01d29b48-ff6f-11eb-b81e-acde48001123
10+
6bc5243e-ef36-45dc-9b12-f4a6be131159
11+
453a6b0f-b0ea-48fa-9cf4-20537ffdd22c
12+
T1036.005
813
#T1014
9-
T1589.001
10-
Amos Stealer
11-
PromptLock
12-
f64579c0-203f-11ec-abcc-acde48001122
13-
004e32e2-146d-11ec-a83f-acde48001122

0 commit comments

Comments
 (0)