@EricaZelic
Thinking beyond exploits, and taking one's time, once you have an initial foothold, with at least some user account, you can generally find additional access. Someone mentioned file shares, which is huge. Also backups, source code (internal git), emails, teams, slack, etc...