hashcat Forum

Full Version: how to crack a windows 10 local user password hash(Netnlm capture)
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
I just ran this command
hashcat64.exe -m 5600 hash.txt -a 3

it seems to be working...
ok it has finished

how do i see the cracked hash?
In case the session status says "Cracked", the password is saved to a file called "hashcat.potfile" in the directory where your hashcat executable is located.
damn the session was just "hashcat"

I am having no luck, could I have some help performing a dictionary attack?
That's the session name, not the status. The status is shown in the following line.
Pages: 1 2