18 Common Techniques Hackers use to Compromise Active Directory and a Checklist of How to Defend Yourself