get_range_skeleton
Retrieve pre-configured cyber range environments for security testing, including AD labs, red team exercises, and SOC training with customizable VMs and network rules.
Instructions
Get a complete range skeleton configuration.
Retrieves a fully-configured range skeleton with all VMs and network rules. Some skeletons support additional customization parameters.
Args: name: Skeleton name (e.g., "basic-ad", "enterprise-ad", "red-team") domain: Custom domain name (for AD labs, default: "yourcompany.local") workstations: Number of workstations (for basic-ad, default: 2) include_attacker: Include Kali attacker VM (default: True) include_siem: Include SIEM monitoring (default: True) siem_type: SIEM type: "wazuh", "splunk", "elastic" (default: "wazuh")
Returns: Complete range configuration with VMs and network rules
Available skeletons: - basic-ad: Customizable with domain, workstations, attacker, siem - enterprise-ad: Full enterprise with CA, file server, SQL, exchange - red-team: DMZ + internal AD for red team exercises - soc-training: Monitored endpoints for SOC training - web-pentest: DVWA, Juice Shop, WebGoat - malware-analysis: Isolated RE lab
Example: # Get a basic AD lab config = await get_range_skeleton("basic-ad")
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | ||
| domain | No | ||
| workstations | No | ||
| include_attacker | No | ||
| include_siem | No | ||
| siem_type | No | wazuh |