Identity Attacks Explained: How Adversaries Steal Credentials & Takeover Accounts