Simuler des attaques pour tester les défenses.
10:00 AM | Phishing email sent | SET / Gophish | Initial Access |
10:05 AM | Reverse shell initiated | HTA payload | Execution |
10:10 AM | Credential dumping | Mimikatz | Credential Access |
10:15 AM | Lateral movement | Pass-the-Hash | Lateral Movement |
10:20 AM | Privilege escalation | ExploitKit | Privilege Escalation |
10:25 AM | Data exfiltration | DNS tunneling | Exfiltration |
Include screenshots of exploit execution if possible.