Access crown jewel systems: executive email, transaction processing, customer database. - Demonstrate data collection capability (email harvesting, database queries) without exfiltrating real data. - Document all access achieved and evidence collected.