GSJ: Volume 13, Issue 5, May 2025, Online: ISSN 2320-9186 www.globalscientificjournal.com Simulation of Social Engineering-Based APT Attacks with Cyber Sentinel Onyedinma, E.G. 1 , Asogwa D.C. 2 , Onwumbiko J.N 3 , Morba, J. 4 1,2,,4 Department of Computer Science, Nnamdi Azikiwe University, Awka. Anambra state, Nigeria. 4 Department of Library and Information Science, Nnamdi Azikiwe University, Awka. Anambra state, Nigeria. eg.osita@unizik.edu.ng 1 , dc.asogwa@unizik.edu.ng 2 , jn.onwumbiko@unizik.edu.ng 3 , j.morba@unizik.edu.ng 4 Abstract Advanced Persistent Threats (APTs) represent a critical challenge in cybersecurity due to their stealth, persistence, and adaptive techniques. They often leverage social engineering tactics to infiltrate secure environments undetected. This paper presents a simulation framework for Cyber Sentinel; designed to model and analyse social engineering-based APT attacks in a controlled environment. The framework integrates a Command Line Interface (CLI) for reconnaissance and offensive operations, a Command-and-Control (C2) server for dropper deployment, and a simulated Active Directory (AD) server representing a typical enterprise environment. By emulating attack vectors such as phishing and malware delivery, this simulation provides cybersecurity practitioners and researchers with a testbed to evaluate detection mechanisms, incident response strategies, and the effectiveness of cybersecurity policies. It therefore enhances preparedness against real-world threats while enabling safe experimentation with advanced attack techniques. Test APT scenarios when executed, yielded success rates between 60% and 100%, while enabling the assessment of detection and mitigation strategies. Keywords: Advanced Persistent Threats, cybersentinel, command line interface, cybersecurity, dropper, framework, offensive tool ,social Engineering. I. Introduction Advanced Persistent Threats (APTs) have emerged as one of the most sophisticated and persistent challenges in modern cybersecurity. These attacks are often executed by well-resourced adversaries who leverage multi-stage strategies ranging from initial reconnaissance and exploitation to long-term system compromise and data exfiltration frequently over extended periods of time [1]. According to a 2024 report by Kaspersky, APTs targeted 25% of organizations and accounted for 43% of high- GSJ: Volume 13, Issue 5, May 2025 ISSN 2320-9186 473 GSJ© 2025 www.globalscientificjournal.com