We need valid credentials or access to a domain joined machine for this attack
Theory
A user can only receive its TGT & Session Key (AS-REP) after initially sending a timestamp hashed with their passwords (AS-REQ). This is called Kerberos Pre-Authentication.
By default preauthentication is enabled at the user level, but it can sometimes be deactivated, for example for some service accounts.
If Kerberos preauthentication is disabled we can request a TGT & key on the behalf of this user. Once we have received the TGT & key, we can attempt to crack the user hash with hashcat,
We can do this because the session key was encrypted by kerberos using the user hash, therefore hashcat can "extract-crack it".
Requires the DC IP and at the end the domain name and the username of the user who will perform the roasting (we will be prompted for the password) since our kali isn't domain joined and we aren't authenticated.
It gives us the output listing user without preauthentication: