Validates that network access and segmentation controls enforce trust boundaries under realistic abuse and lateral-movement scenarios.
•
NAC enforcement — posture bypass, MAC spoofing, rogue device insertion
•
Guest isolation — guest-to-corporate traversal, DHCP and routing path abuse
•
VLAN segmentation — VLAN hopping, broadcast leakage, cross-segment discovery
•
Wireless security — evil-twin detection, encryption downgrade, rogue AP association
•
Lateral containment — blast-radius reduction, trusted-system pivot abuse, east-west restriction