We Will Explain and Abuse Shadow Credentials
In the kerberos authentication the client must perform pre-auth to make sure that his credential is not stolen and cracked offline.
With that being said the client encrypt the timestamp with their credential to prevent the ASREP Attack.

Now let’s see how the authentication works
Client —> pre-auth data encrypted with the timestamp
KDC Server —> decrypt it and validate it’s correct
KDC Server —> Send ASREP to the client with the TGT


Client —> pre-auth and encrypt the timestamp with his private key
KDC Server —> Validate the client Certificate
KDC Server —> Decrypt it to verify
KDC Server —> sends ASREP to the client with the TGT
