Windows Backdoor Attack Simulation and Post-Exploitation Analysis

تفاصيل العمل

This project demonstrates a full attack lifecycle simulation against a Windows system in a controlled lab environment. The objective was to understand how attackers establish unauthorized access, escalate privileges, maintain persistence, and cover their tracks after compromising a system.

The lab also focused on identifying defensive controls and detection opportunities to help security teams prevent or detect such attacks in real-world environments.

ملفات مرفقة

بطاقة العمل

اسم المستقل
عدد الإعجابات
0
عدد المشاهدات
1
تاريخ الإضافة