TO DO! To do Just a list of topics I want to cover soon DLL hijacking/sideloading How Kerberos works, and how some exploits actually work