Simuler des attaques pour tester les défenses.
| 10:00 AM | Phishing email sent | SET / Gophish | Initial Access |
| 10:05 AM | Reverse shell initiated | HTA payload | Execution |
| 10:10 AM | Credential dumping | Mimikatz | Credential Access |
| 10:15 AM | Lateral movement | Pass-the-Hash | Lateral Movement |
| 10:20 AM | Privilege escalation | ExploitKit | Privilege Escalation |
| 10:25 AM | Data exfiltration | DNS tunneling | Exfiltration |
Include screenshots of exploit execution if possible.