One Token to Rule Them All: Post-Exploitation Fun in Windows Environments