I'm trying to recover the password of a mac osx 10.6 account. I collected the hash from the computer,
C3613C8C87F0D5F460114AE28EE44466F9691D46B33BF2CF
I took the first 4 bytes off the beginning, which is the salt. so I have
Hash 87F0D5F460114AE28EE44466F9691D46B33BF2CF
Salt C3613C8C
I made a text filed named hash.txt and put this in it
87F0D5F460114AE28EE44466F9691D46B33BF2CF:C3613C8C
then I created another text file called word.txt, and put in the password, which is "abc123"
I then entered this command, ./oclHashcat64.bin -m 102 --hex-salt hash.txt word.txt word.txt
This is the result:
oclHashcat v0.26 by atom starting...
Digests: 1 entries, 1 unique
Salts: 1 entries, 1 unique
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Platform: AMD compatible platform found
Watchdog: Temperature limit set to 90c
Device #1: ATI RV730, 512MB, 0Mhz, 8MCU
NOTE: gpu-accel auto-adjusted to: 8
Device #1: Kernel ./kernels/4098/m0102.ATI RV730.64.kernel
WARNING: words in dict_left < 4096. Can't gain full performance
WARNING: words in dict_right < 128. Can't gain full performance
87f0d5f460114ae28ee44466f9691d46b33bf2cf:c3613c8c:
[s]tatus [p]ause [r]esume [q]uit =>
Status.......: Cracked
Hash.Type....: sha1($salt.$pass)
Mode.Left....: Dict 'word.txt' (3)
Mode.Right...: Dict 'word.txt' (3)
Speed.GPU*...: 0/s
Recovered....: 1/1 Digests, 1/1 Salts
Progress.....: 0/9 (0.00%)
Running......: 1 sec
Estimated....: 0 secs
HW.Monitor.#1: 0% GPU, 46c Temp
As you can see, it cracks it, but it doesn't print the password. I tried outputting it to a file as well, it also doesn't show the cracked password.
Any suggestions?
Nvm I figured it out myself. I needed to add --outfile-format=2
Works great now!
C3613C8C87F0D5F460114AE28EE44466F9691D46B33BF2CF
I took the first 4 bytes off the beginning, which is the salt. so I have
Hash 87F0D5F460114AE28EE44466F9691D46B33BF2CF
Salt C3613C8C
I made a text filed named hash.txt and put this in it
87F0D5F460114AE28EE44466F9691D46B33BF2CF:C3613C8C
then I created another text file called word.txt, and put in the password, which is "abc123"
I then entered this command, ./oclHashcat64.bin -m 102 --hex-salt hash.txt word.txt word.txt
This is the result:
oclHashcat v0.26 by atom starting...
Digests: 1 entries, 1 unique
Salts: 1 entries, 1 unique
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Platform: AMD compatible platform found
Watchdog: Temperature limit set to 90c
Device #1: ATI RV730, 512MB, 0Mhz, 8MCU
NOTE: gpu-accel auto-adjusted to: 8
Device #1: Kernel ./kernels/4098/m0102.ATI RV730.64.kernel
WARNING: words in dict_left < 4096. Can't gain full performance
WARNING: words in dict_right < 128. Can't gain full performance
87f0d5f460114ae28ee44466f9691d46b33bf2cf:c3613c8c:
[s]tatus [p]ause [r]esume [q]uit =>
Status.......: Cracked
Hash.Type....: sha1($salt.$pass)
Mode.Left....: Dict 'word.txt' (3)
Mode.Right...: Dict 'word.txt' (3)
Speed.GPU*...: 0/s
Recovered....: 1/1 Digests, 1/1 Salts
Progress.....: 0/9 (0.00%)
Running......: 1 sec
Estimated....: 0 secs
HW.Monitor.#1: 0% GPU, 46c Temp
As you can see, it cracks it, but it doesn't print the password. I tried outputting it to a file as well, it also doesn't show the cracked password.
Any suggestions?
Nvm I figured it out myself. I needed to add --outfile-format=2
Works great now!