Mac OS X 10.6 sha1 decrytion
#1
Question 
Hey guys!

I try to decrypt a mac os x password hash. I've got it via:
Code:
dscl localhost -read /Search/Users/username | grep GeneratedUID | cut -c15-
cat /var/db/shadow/hash/GUID | cut -c169-216
./hashcat --session SHA -m 122 hash.txt

hascats starts but I'm don't think it's doing something:

Code:
hashcat () starting...

OpenCL Platform #1: Apple              
=========================
- Device #1: Intel(R) Xeon(R) CPU           X5675  @ 3.07GHz, skipped
- Device #2: AMD Radeon HD Tahiti XT Prototype Compute Engine, 768/3072 MB allocatable, 32MCU

Hashes: 1 hashes; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Applicable Optimizers:
* Zero-Byte
* Precompute-Init
* Precompute-Merkle-Demgard
* Early-Skip
* Not-Iterated
* Prepended-Salt
* Single-Hash
* Single-Salt
* Raw-Hash
- Device #2: Kernel m00120_a0.12930a29.kernel not found in cache! Building may take a while...
Starting attack in stdin mode...

                                                         
Session.Name...: SHA
Status.........: Running
Input.Mode.....: Pipe
Hash.Target....: 5c2xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
Hash.Type......: OSX v10.4, v10.5, v10.6
Time.Started...: Tue Sep 27 21:53:54 2016 (9 secs)
Speed.Dev.#2...:        0 H/s (0.00ms)
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 0
Rejected.......: 0


<<<<<<<<<<---->>>>>>>>>

Session.Name...: SHA
Status.........: Running
Input.Mode.....: Pipe
Hash.Target....: 5c2xxxxxxxxxxxxxxxxxxxxxxxxxx...
Hash.Type......: OSX v10.4, v10.5, v10.6
Time.Started...: Tue Sep 27 21:53:54 2016 (1 min, 9 secs)
Speed.Dev.#2...:        0 H/s (0.00ms)
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 0
Rejected.......: 0


Does is compute? I don't hear the gnu running (as I do hear it while working)
I tried the NTLM as well, but it does not work as well:
Code:
Session.Name...: NTLM
Status.........: Running
Input.Mode.....: Pipe
Hash.Target....: 6f5xxxxxxxxxxxxxxxxxxxxxxxxxx
Hash.Type......: NTLM
Time.Started...: Tue Sep 27 22:14:44 2016 (49 secs)
Speed.Dev.#2...:        0 H/s (0.00ms)
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 0
Rejected.......: 0

I don't anything about the password except that it's pretty long and I except it to be pretty complex.
#2
Reminder that there is no "decryption" for a hash.
Then you're not telling hashcat what to do, so it's waiting for input (something that can be easily spotted with "Starting attack in stdin mode..." or "Input.Mode.....: Pipe").

Check the usage and the --help for the syntax to use and options available for the attack you want to do.

PS: Do not post hashes, it is against the forum rules.