Windows - Post-Exploitation

CVE Exploits
Enumeration Post-Exploitation
Windows Hashes

Misconfiguration