Different ways to exploits windows machines
Compiling code
Kerberos Attacks
SMB vulnerabilities
Relay