Summary:
- Demonstrates phishing → payload execution → lateral movement → exfiltration
- Shows real-time alerts in Snort and Splunk
- Walkthrough of containment and eradication steps
- Final demo of hardened environment resisting same attack vector
Outils utilisé
1.
2.
Link:
- YouTube/GDrive: [Insert link]
- Duration: ~15 minutes