Explain how a user’s password is stored on a local Windows system, how it is stored on a domain, the
location for both, and then the authentication process for each to log a user onto the system. If an attacker is
able to acquire the stored passwords, identify what an attacker would need to do to use them to move laterally
in the network. Provide the specific name for each of the two attacks