Windows domain is used in 99% of the Fortune 500 companies. It is the foundation of all enterprise IT system. The domain is a central database with all the users, workstations and servers in the enterprise.
The IT staff uses domain administrator credentials to do the daily admin tasks, like resetting user passwords, troubleshooting issues on the workstations, installing new services on the servers, etc. Whenever an attacker gains domain admin credential, only the imagination is the limit what the attacker can do with this.
I will detail the common steps attackers use to gain user credentials on the network and how this user credential can be escalated to local admin credentials. And last but not least, how a local admin user can elevate to domain admin. I will talk about pass the hash, GPP, MS14-068, and other tricks.