ity to compromise a Windows domain controller, which is a great start towardsCompromising other domain controllers (DCs)Compromising computers in the forest, attacking non-forest computers in the zone of trust accessible to the DCEscalating any kind of privilege that is controlled by groups, accounts or other objects in the Active DirectoryIntelligence gatheringDoing mischief with DNS against anyt