So I got bored of playing with WPA capture files and wanted to try something new. I used the msfconsole's /auxillary/server/capture/smb "run" and then captured a UNC request coming from a Windows 7 machine (that I have the password for).

But when I try pasting the captured hash into a .txt file and using hashcat with the -m 1000 option it keeps telling me that there is a "line length exception". I have tried with the --username and --show options and get nothing. What am I doing wrong? There is 1 article on NTLM for every 1000 on WPA and most of them are older than Jesus. What is the exact command to crack NTLM passwords using hashcat?