How to take advantage of the NetSessionEnum API to determine remotely logged in users.
Using BloodHound to exploit Active Directory based networks.