GSJ: Volume 13, Issue 5, May 2025, Online: ISSN 2320-9186
www.globalscientificjournal.com
Simulation of Social Engineering-Based APT Attacks with Cyber Sentinel
Onyedinma, E.G.
1
, Asogwa D.C.
2
, Onwumbiko J.N
3
, Morba, J.
4
1,2,,4
Department of Computer Science, Nnamdi Azikiwe University, Awka. Anambra state, Nigeria.
4
Department of Library and Information Science, Nnamdi Azikiwe University, Awka. Anambra
state, Nigeria.
eg.osita@unizik.edu.ng
1
, dc.asogwa@unizik.edu.ng
2
, jn.onwumbiko@unizik.edu.ng
3
,
j.morba@unizik.edu.ng
4
Abstract
Advanced Persistent Threats (APTs) represent a critical challenge in cybersecurity due to their stealth,
persistence, and adaptive techniques. They often leverage social engineering tactics to infiltrate
secure environments undetected. This paper presents a simulation framework for Cyber Sentinel;
designed to model and analyse social engineering-based APT attacks in a controlled environment.
The framework integrates a Command Line Interface (CLI) for reconnaissance and offensive
operations, a Command-and-Control (C2) server for dropper deployment, and a simulated Active
Directory (AD) server representing a typical enterprise environment. By emulating attack vectors
such as phishing and malware delivery, this simulation provides cybersecurity practitioners and
researchers with a testbed to evaluate detection mechanisms, incident response strategies, and the
effectiveness of cybersecurity policies. It therefore enhances preparedness against real-world threats
while enabling safe experimentation with advanced attack techniques. Test APT scenarios when
executed, yielded success rates between 60% and 100%, while enabling the assessment of detection
and mitigation strategies.
Keywords: Advanced Persistent Threats, cybersentinel, command line interface, cybersecurity,
dropper, framework, offensive tool ,social Engineering.
I. Introduction
Advanced Persistent Threats (APTs) have emerged as one of the most sophisticated and persistent
challenges in modern cybersecurity. These attacks are often executed by well-resourced adversaries
who leverage multi-stage strategies ranging from initial reconnaissance and exploitation to long-term
system compromise and data exfiltration frequently over extended periods of time [1]. According to
a 2024 report by Kaspersky, APTs targeted 25% of organizations and accounted for 43% of high-
GSJ: Volume 13, Issue 5, May 2025
ISSN 2320-9186 473
GSJ© 2025
www.globalscientificjournal.com