Privileged Access
Kerberos "Double Hop"
Bleeding Edge Vulnerabilities
Miscellaneous Misconfigurations