Hello all. I am working a weighted attack graph tool, and need an complete example of a cyber attack from start to finish. I want to see if the weights we are using actually make sense, hence the reason for a more complex attack. I have searched all over and can only find simplistic examples, which are not useful.
Thank you for any help.