I think this is going past what hashcat is about and more turning in how you can hack a certain piece of software.
You have all the information in this topic (and external sources) to understand intercepted data and how to attack it using the hashcat md5 module.
Some more general tips:
- https://www.w3schools.com/whatis/default.asp
- http://www.robotroom.com/NumberSystems4.html
- https://www.wireshark.org/download/docs/user-guide.pdf
Learning how everything works will help understand what you need, how to change it and how to use it.
You have all the information in this topic (and external sources) to understand intercepted data and how to attack it using the hashcat md5 module.
Some more general tips:
- https://www.w3schools.com/whatis/default.asp
- http://www.robotroom.com/NumberSystems4.html
- https://www.wireshark.org/download/docs/user-guide.pdf
Learning how everything works will help understand what you need, how to change it and how to use it.