Pass Attacks/ Pass the hash
Dumping and Cracking Hashes
Kerberoasting
Token Impersonation