Different ways to exploits windows machines

Compiling code

Kerberos Attacks

SMB vulnerabilities

Relay