β Day 11 β Full Attack Scenario Simulation (Phishing β Brute Force β Privilege Escalation)
Today you will teach students a complete SOC workflow:
- Attacker sends phishing
- User gets compromised
- Brute-force attack begins
- Successful login happens
- Privilege escalation occurs
- Persistence created
- Evidence appears in Splunk
- SOC Analyst investigates & maps to MITRE
This gives students REAL experience.
π― Objectives
By end of Day 11 your students should understand:
β How attackers chain multiple techniques
β How logs reveal each step
β How to detect attacks using Splunk
β How MITRE ATT&CK maps to each stage
β How SOC Analysts investigate incidents
π§© Attack Scenario Overview (Simple Story)
Explain to students:
βAn attacker targets an employee with a phishing email.
They get initial access, try multiple logins, escalate privileges, and create persistence.
We will detect all this through Windows + Linux logs in Splunk.β
π₯ Stage 1 β Initial Access (Phishing Simulation)
Tell students:
- User clicked a fake PDF
- Attacker now has password
Since we canβt simulate phishing directly, we simulate results:
β Attacker tries multiple login failures
β Then succeeds one login
Splunk Query:
index=* EventCode=4625
MITRE: Initial Access (T1566)
π₯ Stage 2 β Credential Access (Brute Force Simulation)
Attacker tries many passwords.
Splunk:
index=* EventCode=4625
| stats count by IpAddress
| where count > 5
MITRE: T1110 Brute Force
π₯ Stage 3 β Successful Compromise
After several failures:
index=* EventCode=4624
Look for successful logons in same time window.
MITRE: T1078 Valid Accounts
π₯ Stage 4 β Lateral Movement (RDP Login)
Attacker uses RDP to get inside.
Splunk:
index=* EventCode=4624 Logon_Type=10
MITRE: T1021 Lateral Movement
π₯ Stage 5 β Privilege Escalation
Attacker gets admin rights.
Splunk:
index=* EventCode=4672
MITRE: T1068 Privilege Escalation
π₯ Stage 6 β Persistence (New Account Created)
Attacker creates a new admin account:
Splunk:
index=* EventCode=4720 OR EventCode=4732
MITRE: T1136 Create Account
π§ͺ Day 11 Hands-On Simulation
Give students these tasks:
Task 1 β Identify initial brute-force
index=* EventCode=4625
| stats count by Account_Name, IpAddress
Task 2 β Identify the successful login
index=* EventCode=4624
| stats count by Account_Name, IpAddress
Task 3 β Correlate failed + successful logins
index=* (4624 OR 4625)
| transaction Account_Name maxspan=5m
Task 4 β Detect lateral movement
index=* EventCode=4624 Logon_Type=10
Task 5 β Detect privilege escalation
index=* EventCode=4672
Task 6 β Detect persistence
index=* (EventCode=4720 OR EventCode=4732)
π€ Trainer Script (Say to Students)
βThis is how attackers behave in real life.
They don’t use one technique β they chain multiple.
Today you detected an attack from initial access to persistence.
This is real SOC work.β
π Homework (Day 11)
Students submit:
- Screenshot of brute-force detection
- Screenshot of successful login
- Screenshot of privilege escalation
- Screenshot of persistence
- MITRE mapping for each
Leave a comment