Select “Ntlm John Crack” from the menu. Allow up to 30 seconds to initialize the network.
A single attacker pane will appear in your terminal.
Run the following command to crack the NetNTLM hash found in the last lab. Note that this uses a wildcard for the capture filename, you may need to specify your filename directly if the file cannot be found.
john --format=netntlm /Wifi-Forge/Framework/loot/wpa_handshake_capture* --mask='Badpass?d' --min-length=7 --max-length=13 --pot=/Wifi-Forge/Framework/loot/output.pot
The above command is an example of using a mask. Masks point John in a direction to crack a password from a partially known one. In this case, John brute forces the password by appending a set of characters onto the phrase Badpass. Masks are usually useful if a pattern can be found among groups of passwords.
Eventually, John will crack the password as seen in the screenshot below.
Use the main_menu
command to return to the main menu and onto the next lab.
NEXT LAB: Lab 09 - Rogue AP with Wifiphisher