The following is specific to Kali Linux.
After recovering hashes from the target create a text file with the hashes separated by a new line. Save it in the current working directory as something like hash.txt.
Make sure you have unzipped the rockyou.txt password list as this is the password file we will be using to match the hashes against.
cd /usr/share/wordlists/ ls
Once the directory is listed, look to see if the rockyou.txt has a gz after the .txt. If so you need to run the following to unpack it:
gunzip rockyou.txt.gz
Use the following command to begin the hashcat processs:
hashcat -m 0 --force hash.txt /usr/share/wordlists/rockyou.txt
This will then kick off the process of attempting to decode the hashes and provide a list of passwords.