Select “Ntlm John Crack” from the menu. Allow up to 30 seconds to initialize the network.

A single attacker pane will appear in your terminal.

Run the following command to crack the NetNTLM hash found in the last lab. Note that this uses a wildcard for the capture filename, you may need to specify your filename directly if the file cannot be found.

john --format=netntlm /Wifi-Forge/Framework/loot/wpa_handshake_capture* --mask='Badpass?d' --min-length=7 --max-length=13 --pot=/Wifi-Forge/Framework/loot/output.pot

The above command is an example of using a mask. Masks point John in a direction to crack a password from a partially known one. In this case, John brute forces the password by appending a set of characters onto the phrase Badpass. Masks are usually useful if a pattern can be found among groups of passwords.

Eventually, John will crack the password as seen in the screenshot below.

Use the main_menu command to return to the main menu and onto the next lab.

NEXT LAB: Lab 09 - Rogue AP with Wifiphisher