Can you post the full output - full command line, and the results?
This is what a successful run (but unsuccessful crack) looks like ('hashcat') happens to not be in RockYou:
Notice that it finished very quickly - it's a fast hash (and a relatively short wordlist for that fast of a hash)
This is what a successful run (but unsuccessful crack) looks like ('hashcat') happens to not be in RockYou:
Code:
$ hashcat -m 110 -a 0 110.hash /home/royce/crack/rockyou.txt
hashcat (v5.1.0-1403-g87022919) starting...
========================================================================
* Device #1: GeForce GTX 970, 1010/4041 MB allocatable, 13MCU
* Device #2: GeForce GTX 750 Ti, 500/2002 MB allocatable, 5MCU
OpenCL API (OpenCL 1.2 LINUX) - Platform #2 [Intel(R) Corporation]
==================================================================
* Device #3: Intel(R) Core(TM) i5-2500K CPU @ 3.30GHz, skipped
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Applicable optimizers:
* Zero-Byte
* Early-Skip
* Not-Iterated
* Single-Hash
* Single-Salt
* Raw-Hash
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Minimim salt length supported by kernel: 0
Maximum salt length supported by kernel: 256
ATTENTION! Pure (unoptimized) backend kernels selected.
Using pure kernels enables cracking longer passwords but for the price of drastically reduced performance.
If you want to switch to optimized backend kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 444 MB
Dictionary cache built:
* Filename..: /home/royce/crack/rockyou.txt
* Passwords.: 14344391
* Bytes.....: 139921497
* Keyspace..: 14344384
* Runtime...: 2 secs
Approaching final keyspace - workload adjusted.
Session..........: hashcat
Status...........: Exhausted
Hash.Name........: sha1($pass.$salt)
Hash.Target......: 2fc5a684737ce1bf7b3b239df432416e0dd07357:2014
Time.Started.....: Sat Oct 12 07:00:49 2019 (2 secs)
Time.Estimated...: Sat Oct 12 07:00:51 2019 (0 secs)
Guess.Base.......: File (/home/royce/crack/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 8113.6 kH/s (7.56ms) @ Accel:1024 Loops:1 Thr:64 Vec:1
Speed.#2.........: 5417.1 kH/s (6.50ms) @ Accel:1024 Loops:1 Thr:64 Vec:1
Speed.#*.........: 13530.7 kH/s
Recovered........: 0/1 (0.00%) Digests
Progress.........: 14344384/14344384 (100.00%)
Rejected.........: 0/14344384 (0.00%)
Restore.Point....: 14037131/14344384 (97.86%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Restore.Sub.#2...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: 1452123 -> 046379656
Candidates.#2....: $HEX[303436333739333839] -> $HEX[042a0337c2a156616d6f732103]
Hardware.Mon.#1..: Temp: 41c Fan: 39% Util: 22% Core:1050MHz Mem:3004MHz Bus:8
Hardware.Mon.#2..: Temp: 30c Fan: 33% Util: 32% Core:1058MHz Mem:2700MHz Bus:8
Started: Sat Oct 12 07:00:36 2019
Stopped: Sat Oct 12 07:00:51 2019
Notice that it finished very quickly - it's a fast hash (and a relatively short wordlist for that fast of a hash)
~