1. Legacy System Interaction
A service ticket request is made to a legacy application that uses weak encryption, potentially raising the alarm due to the presence of a modern host requesting the ticket.
2. Targeted Attack Simulation
An attacker, having gained limited access, specifically requests tickets with weak ciphers to speed up password cracking and escalate privileges.