There is only one attack path to compromise a machine. After Grammerly check the whole report. Ensure screenshots are consistent with each section. Possible References that can be used Not A Security Boundary: Breaking Forest Trusts – harmj0y