how to crack a windows 10 local user password hash(Netnlm capture) - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: how to crack a windows 10 local user password hash(Netnlm capture) (/thread-8541.html) Pages:
1
2
|
RE: how to crack a windows 10 local user password hash(Netnlm capture) - rustywarships - 08-17-2019 I just ran this command hashcat64.exe -m 5600 hash.txt -a 3 it seems to be working... RE: how to crack a windows 10 local user password hash(Netnlm capture) - rustywarships - 08-17-2019 ok it has finished how do i see the cracked hash? RE: how to crack a windows 10 local user password hash(Netnlm capture) - NoReply - 08-17-2019 In case the session status says "Cracked", the password is saved to a file called "hashcat.potfile" in the directory where your hashcat executable is located. RE: how to crack a windows 10 local user password hash(Netnlm capture) - rustywarships - 08-17-2019 damn the session was just "hashcat" I am having no luck, could I have some help performing a dictionary attack? RE: how to crack a windows 10 local user password hash(Netnlm capture) - NoReply - 08-18-2019 That's the session name, not the status. The status is shown in the following line. |