kerberoast module will attempt to fetch Service Principal Names that are associated with normal user accounts. What is returned is a ticket that is encrypted with the user account’s password, which can then be bruteforced offline. The following command is run on a Windows machine in the victim domain.
Output File: hashes.txt
Rubeus.exe kerberoast /outfile:hashes.txt