Abstract
This was one of the more in-depth labs from my network security and analysis class. The purpose was to simulate malicious activity and observe any resulting indicators on an endpoint machine.
Preview
/
[pdf]