Emulating real world attackers or groups (Example: APT28) targeting the client's infrastructure in order to identify flaws and test their defensive security team response.
Using specific tactics, techniques and procedures (TTPs) it was possible to compromise multiple vessels (oil tankers and not only) and reaching directly within the ICS network which was fully segregated.