how to crack a windows 10 local user password hash(Netnlm capture)
#1
Photo 
Hi 

How do I crack a windows 10 local user password hash(Netnlm capture) I have been trying for ages and have read the wiki, I can not work it out. 

I am using the latest stable version of hashcat on a windows 10 OS using the command prompt.
The hash is in the same folder as hashcat64 and is in a text document called hash.txt

I was told to use this command:

"hashcat64.exe -m 5600 hash.txt -a 3 -1 ?l?u?d -i 5:15 ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1"

but this did not work, after 10 seconds it was "exhausted"

If you would like any more details please ask me.

thank you

My email is: please.find.my.mouse@gmail.com
Reply
#2
-i does not accept any arguments, check --help for the correct usage
Reply
#3
What do you mean buy arguments? and where can I find --help.


Thank you so much for your help.
Reply
#4
hashcat.exe --help

or literally the first result:
https://www.google.com/search?q=hashcat+help

please try harder  🤨
Reply
#5
Ok, so what do I change the -i to? or do I just remove it outright.


Thank you for your help.
Reply
#6
Replace
Code:
-i 5:15
by the correct syntax

[spoil]-i --increment-min 5 ---increment-max 15[/spoil]

You can remove --i if you do not need to increment.
Reply
#7
I will try

Thanks
Reply
#8
I tried removing the increment and it took about an hour to get up to 100% and then it restarted back to 0% it is in that loop should I let do its thing?
Reply
#9
"it is in that loop should I let do its thing?"

Yeah you should also see that it took 1 hour to do 5 positions, and it wil take several days to do the next 100%
Reply
#10
got it, thanks!
Reply