the password for this hash is the empty string, ""
the double colon says this (nothing between the colons means empty string)
the LF is also correct at the end, otherwise the next cracked hash:password:hex pair would end up on the same line
the hex code for the empty string is ofc also empty/null (therefore we do not see anything), besides the trailing line feed
So everything seems kind of ok...
PS. It doesn't really help posting hashes.... if you just say "the -m 122 hash of CRLF starts w/ fa86" we could very quickly double-check and proove that this is not the case
PSS. also checking for blank passworts makes sense most of the times... and in those specific cases (small dict) it is also sort of a performance measurement e.g. *hashcat loads words (from dicts) in huge blocks (most of the time)... if the block is not filled (at the end of the wordlist/run etc) -> check empty password ...
well - little bit off-topic - , there is an open trac ticket https://hashcat.net/trac/ticket/165 that also deals w/ blank passwords... maybe someone could help/discuss there when it currently does not work and how it should be implemented
the double colon says this (nothing between the colons means empty string)
the LF is also correct at the end, otherwise the next cracked hash:password:hex pair would end up on the same line
the hex code for the empty string is ofc also empty/null (therefore we do not see anything), besides the trailing line feed
So everything seems kind of ok...
PS. It doesn't really help posting hashes.... if you just say "the -m 122 hash of CRLF starts w/ fa86" we could very quickly double-check and proove that this is not the case
PSS. also checking for blank passworts makes sense most of the times... and in those specific cases (small dict) it is also sort of a performance measurement e.g. *hashcat loads words (from dicts) in huge blocks (most of the time)... if the block is not filled (at the end of the wordlist/run etc) -> check empty password ...
well - little bit off-topic - , there is an open trac ticket https://hashcat.net/trac/ticket/165 that also deals w/ blank passwords... maybe someone could help/discuss there when it currently does not work and how it should be implemented