I find this article quite difficult to comprehend, we go from rooting firewalls to somehow magically obtaining Microsoft active directory secrets? There’s no logical flow to how attackers are jumping ...