recovering Sha1+salt password with oclHashCat
I'm trying to recover the password of a mac osx 10.6 account. I collected the hash from the computer,


I took the first 4 bytes off the beginning, which is the salt. so I have

Hash 87F0D5F460114AE28EE44466F9691D46B33BF2CF
Salt C3613C8C

I made a text filed named hash.txt and put this in it


then I created another text file called word.txt, and put in the password, which is "abc123"

I then entered this command, ./oclHashcat64.bin -m 102 --hex-salt hash.txt word.txt word.txt

This is the result:

oclHashcat v0.26 by atom starting...

Digests: 1 entries, 1 unique
Salts: 1 entries, 1 unique
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Platform: AMD compatible platform found
Watchdog: Temperature limit set to 90c
Device #1: ATI RV730, 512MB, 0Mhz, 8MCU
NOTE: gpu-accel auto-adjusted to: 8
Device #1: Kernel ./kernels/4098/m0102.ATI RV730.64.kernel
WARNING: words in dict_left < 4096. Can't gain full performance
WARNING: words in dict_right < 128. Can't gain full performance
[s]tatus [p]ause [r]esume [q]uit =>
Status.......: Cracked
Hash.Type....: sha1($salt.$pass)
Mode.Left....: Dict 'word.txt' (3)
Mode.Right...: Dict 'word.txt' (3)
Speed.GPU*...: 0/s
Recovered....: 1/1 Digests, 1/1 Salts
Progress.....: 0/9 (0.00%)
Running......: 1 sec
Estimated....: 0 secs
HW.Monitor.#1: 0% GPU, 46c Temp

As you can see, it cracks it, but it doesn't print the password. I tried outputting it to a file as well, it also doesn't show the cracked password.

Any suggestions?

Nvm I figured it out myself. I needed to add --outfile-format=2

Works great now!
awesome, thanks. thread closed.