Techniques for lateral movement, privilege escalation, persistence, and data exfiltration after initial access.