Quick steps below for capturing a NTLM hash and trying to crack it using the tools Responder and Hashcat. Below I forced a direct connection attempt to the pentest machine to get the hash.
sudo responder -I wlan0 -rdw
Once I try connecting to the pentest machine on \\192.168.50.165 I get the hash which I save to adminhash.txt