Objective

Validate defensive visibility and response from initial access through service disruption in a segmented enterprise environment.

Scenario Summary

This scenario is designed as an end-to-end experiment rather than a one-step attack demo. Its value comes from observing how telemetry, detections, and analyst workflow perform across the full chain.

Intended Behaviors

  • initial foothold
  • credential access
  • privilege escalation
  • lateral movement
  • service disruption conditions