Vulnerabilities in the Red Team Attack Lab Kerberoasting ASREP Roasting Constrained & Unconstrained Delegation