802.1X Bypass to Ghost Pine AFB Outage
Reference scenario for end-to-end adversary-emulation and defensive validation
Objective
Validate defensive visibility and response from initial access through service disruption in a segmented enterprise environment.
Scenario Summary
This scenario is designed as an end-to-end experiment rather than a one-step attack demo. Its value comes from observing how telemetry, detections, and analyst workflow perform across the full chain.
Intended Behaviors
- initial foothold
- credential access
- privilege escalation
- lateral movement
- service disruption conditions