Exploit Attack Paths in a Windows Environment