To architect an offensive engagement against a hardened, localized Windows 11 endpoint using an enterprise-grade Command and Control (C2) framework. The objective encompasses payload weaponization, defense evasion via Living-off-the-Land (LotL) techniques, simulated post-exploitation (persistence and ransomware behavior), and a comprehensive Blue Team detection analysis utilizing the Wazuh SIEM and Sysmon telemetry.
Before executing the engagement, specific tools were selected to accurately mirror modern Advanced Persistent Threat (APT) behaviors:
192.168.74.30) to ensure complete isolation from production networks.The offensive infrastructure was staged on the Kali Linux node. An HTTP listener was established on Port 80.
A custom Windows executable (amd64) implant was compiled via Sliver, hardcoded with the attacker IP address and callback port.
To deliver the payload to the victim endpoint (192.168.74.20), a temporary Python web server was staged on the attacker machine.
PowerShell.exe process. By executing Invoke-WebRequest via the command line, the payload was pulled directly to the disk. This mimics real-world adversary techniques designed to bypass user-interaction requirements and browser-based security controls.Upon execution of the payload, a persistent session successfully checked into the Sliver C2 server.
Overcoming Environmental Instability: During post-exploitation, attempts to establish a continuous, interactive shell tunnel hung indefinitely. This was diagnosed as interference from background Windows OS updates and network state changes.
execute module (execute -o cmd.exe /c). This passed the malicious instructions directly into Windows memory as one-shot executions, successfully stabilizing the attack path.With stable execution established, I simulated two distinct MITRE ATT&CK techniques:
net localgroup administrators HACKER /add.
vssadmin delete shadows /all /quiet.
Following the Red Team execution, I pivoted to the Wazuh SIEM to analyze the Sysmon telemetry and validate the detection pipeline. The pipeline successfully captured the entire attack chain.
Despite bypassing the browser, the SIEM detected the initial PowerShell staging. Wazuh captured powershell.exe dropping a temporary script policy file during the execution of Invoke-WebRequest.
Sysmon Event ID 1 (Process Creation) recorded the exact command line execution used to create the backdoor administrator account (net localgroup administrators HACKER /add) running at a High Integrity level.
net.exe is spawned by an unknown or untrusted parent process.The SIEM successfully captured the vssadmin shadow copy deletion. The logs explicitly showed the parent process (cmd.exe /c) executing the vssadmin delete shadows instruction, directly validating the success of the one-shot memory execution pivot used during the attack phase.
vssadmin.This engagement successfully validated the complete lifecycle of a cyber attack within a controlled environment. It demonstrated the practical application of C2 infrastructure, the necessity of adaptable tradecraft (LotL, memory execution) to bypass modern OS hardening, and the critical importance of kernel-level telemetry (Sysmon) for accurate threat hunting and SIEM alerting.