If this is required for the exploit, then this seems like a case of being on the other side of the airtight hatch. [0][1]
[0] - http://blogs.msdn.com/b/oldnewthing/archive/2014/07/04/10539...
[1] - http://blogs.msdn.com/b/oldnewthing/archive/2007/08/07/42687...
there is no exploit as far as i can see. the article just describes how to use a kerberos ticket generated on a machine on another machine.