Lets consider the following assumptions:

1) Some how I gained access to the windows system which in the domain.
2) Maintaining a low privileged user shell on the system

Tools which we used...