Discovery at UU Power & Light¶
You have a simulator full of gloriously vulnerable infrastructure:
Hex steam turbines controlled by hardwired logic designed when “network security” meant locking the door.
The Bursar’s automated alchemical reactor, balancing chemical reactions and metaphysical side effects.
Library environmental management, where alarms are advisory and reality is optional.
City-wide SCADA coordinating systems that were never designed to agree with one another.
No lectures. No fixed path. No facilitator hovering to tell you you are doing it wrong.
Pick a challenge. Seize control of turbine speeds. Steal reactor PLC programmes that nation states would covet. Map the full attack surface. Operate in pure stealth. Or demonstrate the most spectacular cascading failure you can create safely.
Work alone or team up. Some participants spend hours truly understanding Modbus. Others crash every turbine before lunch and start writing custom exploits. The simulator does not judge. The facilitators do not lecture. By the end of the day, you will understand viscerally why industrial security is magnificently, terrifyingly different from everything IT security taught you.
This module works as a red team exercise or as the attack half of a purple team pairing.
Welcome to the infrastructure that keeps the Patrician’s city running. The coffee is hot. The alarms are probably ignorable. Nothing requires a password.