Perform a system and network scan
Enumerate user accounts
Execute remote penetration
Gather information about local network computers