Take the output of the last command above and paste it into a $CERTIFICATE_PEM_FILE on the attacking box. Then:
Move $CERTIFICATE_PFX_FILE back to the target, and then use Rubeus to seal the deal:
This is very useful if we’ve used an AD CS misconfiguration as described by SpectreOps’ “Certified Pre-Owned” research to forge a certificate that’s valid for another user.