Attack Paths from Initial Access to Compromise AD, Backups, and Virtual Infrastructure