I'm trying to setup a system for pen-testing. I'm using the FreeRadius-WPE patch to collect Challenges/Requests from people who connect to my spoofed AP instead of the actual network. Here is the format that FreeRadius-WPE is returning me the credentials:
username: Domain\User
challenge: 57:82:23:55:cd:68:10:ed
response: 6d:dc:ac:a6:1e:cb:ea:b7:7f:dc:b4:08:89:30:b6:82:6e:37:15:a4:1e:92:1f:b6
john NETNTLM: **Domain\User:$NETNTLM$57822355cd6810ed$6ddcaca61ecbeab77fdcb4088930b6826e3715a41e921fb6**
(Most importantly is the line between **'s which is what I send to John/Asleap to crack it)
They're all NTLM v2, so I was hoping to run them through HashCat, but everything I see with HashCat involves some "lc" format that looks like this:
admin::N46iSNekpT:08ca45b7d7ea58ee:88dcbe4446168966a153a0064958dac6:5c7830315c7830310000000000000b45c67103d07d7b95acd12ffa11230e0000000052920b85f78d013c31cdb3b92f5d765c783030
Where "hashcat" is the password. I found this information here.
So again, how can I convert from my strange format to this lc one so that I can use it in HashCat?