Pass Attacks/ Pass the hash

Dumping and Cracking Hashes

Kerberoasting

Token Impersonation