Objectif

Simuler des attaques pour tester les défenses.

Tâches

Outils utilisé

Timeline Example:

10:00 AM Phishing email sent SET / Gophish Initial Access
10:05 AM Reverse shell initiated HTA payload Execution
10:10 AM Credential dumping Mimikatz Credential Access
10:15 AM Lateral movement Pass-the-Hash Lateral Movement
10:20 AM Privilege escalation ExploitKit Privilege Escalation
10:25 AM Data exfiltration DNS tunneling Exfiltration

Include screenshots of exploit execution if possible.