hashcat Forum
how to crack a windows 10 local user password hash(Netnlm capture) - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: how to crack a windows 10 local user password hash(Netnlm capture) (/thread-8541.html)

Pages: 1 2


RE: how to crack a windows 10 local user password hash(Netnlm capture) - rustywarships - 08-17-2019

I just ran this command
hashcat64.exe -m 5600 hash.txt -a 3

it seems to be working...


RE: how to crack a windows 10 local user password hash(Netnlm capture) - rustywarships - 08-17-2019

ok it has finished

how do i see the cracked hash?


RE: how to crack a windows 10 local user password hash(Netnlm capture) - NoReply - 08-17-2019

In case the session status says "Cracked", the password is saved to a file called "hashcat.potfile" in the directory where your hashcat executable is located.


RE: how to crack a windows 10 local user password hash(Netnlm capture) - rustywarships - 08-17-2019

damn the session was just "hashcat"

I am having no luck, could I have some help performing a dictionary attack?


RE: how to crack a windows 10 local user password hash(Netnlm capture) - NoReply - 08-18-2019

That's the session name, not the status. The status is shown in the following line.