There isn’t too much to work off of. Most of AD comes from within

Enumeration

Kerberos

Phishing

Example with .doc

Locate the Macros

Untitled

Create a macro on opening

Macros ⇒ View Macros

Untitled

Untitled