Scenario 1
An attacker uses a compromised user account to perform an SPN sweep. The attacker retrieves a list of service accounts and their associated SPNs. Using a tool like Rubeus, the attacker requests TGS tickets for these accounts and then proceeds to brute-force the tickets offline to obtain the plaintext passwords.
Scenario 2
During a penetration test, the security team runs a script to enumerate SPNs to identify potential targets for Kerberoasting. The detection is triggered, and the security team verifies the activity as part of the assessment.