08-17-2019, 10:36 AM
I just ran this command
hashcat64.exe -m 5600 hash.txt -a 3
it seems to be working...
hashcat64.exe -m 5600 hash.txt -a 3
it seems to be working...
how to crack a windows 10 local user password hash(Netnlm capture)
|
08-17-2019, 10:36 AM
I just ran this command
hashcat64.exe -m 5600 hash.txt -a 3 it seems to be working...
08-17-2019, 10:56 AM
ok it has finished
how do i see the cracked hash?
08-17-2019, 11:06 AM
In case the session status says "Cracked", the password is saved to a file called "hashcat.potfile" in the directory where your hashcat executable is located.
08-17-2019, 02:03 PM
damn the session was just "hashcat"
I am having no luck, could I have some help performing a dictionary attack?
08-18-2019, 02:58 PM
That's the session name, not the status. The status is shown in the following line.
|
« Next Oldest | Next Newest »
|