attack range: create vulnerable instrumented local or cloud environments