I just ran this command
hashcat64.exe -m 5600 hash.txt -a 3
it seems to be working...
ok it has finished
how do i see the cracked hash?
In case the session status says "Cracked", the password is saved to a file called "hashcat.potfile" in the directory where your hashcat executable is located.
damn the session was just "hashcat"
I am having no luck, could I have some help performing a dictionary attack?
That's the session name, not the status. The status is shown in the following line.