802.1X Bypass to Ghost Pine AFB Outage
Reference scenario for end-to-end adversary-emulation and defensive validation
Scenario library for adversary emulation and detection validation
This section documents adversary-emulation scenarios as repeatable validation cases.
Each experiment is intended to answer four practical questions:
Reference scenario for end-to-end adversary-emulation and defensive validation
Experiment focused on host telemetry, detection logic, and follow-on misuse
Experiment focused on host and network visibility during east-west movement