how to crack a windows 10 local user password hash(Netnlm capture)
I just ran this command
hashcat64.exe -m 5600 hash.txt -a 3

it seems to be working...
ok it has finished

how do i see the cracked hash?
In case the session status says "Cracked", the password is saved to a file called "hashcat.potfile" in the directory where your hashcat executable is located.
damn the session was just "hashcat"

I am having no luck, could I have some help performing a dictionary attack?