This document discusses exploiting trust relationships and group policies to escalate privileges on a Windows system with full disk encryption. It describes exploiting MS15-122 and MS16-014 to poison the credential cache and authenticate to a rogue domain controller. Group policies can then be used to run applications with SYSTEM privileges and extract credentials or encryption keys before Windows fully loads. While Windows 10 provides some improvements, similar vulnerabilities were still present until MS16-072 was released after several months.