This project demonstrates a full attack lifecycle simulation against a Windows system in a controlled lab environment. The objective was to understand how attackers establish unauthorized access, escalate privileges, maintain persistence, and cover their tracks after compromising a system.
The lab also focused on identifying defensive controls and detection opportunities to help security teams prevent or detect such attacks in real-world environments.