Active Directory Attack Scenarios Part 2: Going Beyond Domain Admin | Core Security Blog