Getting 0H/S and 0 progress
#1
I am trying to crack my mac password. I have made a PBKDF2-SHA512 hash using a tutorial. When I try to crack it with hash cat. I use the following command line. 

Code:
./hashcat -m 7100 hash.txt

And this is the output it gives me. The progress and the hashrate is the exact same after about 2 hours.


Code:
OpenCL Platform #1: Apple
=========================
* Device #1: Intel(R) Core(TM) i7-3615QM CPU @ 2.30GHz, skipped.
* Device #2: HD Graphics 4000, 384/1536 MB allocatable, 16MCU
* Device #3: GeForce GT 650M, 256/1024 MB allocatable, 2MCU

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Slow-Hash-SIMD-LOOP
* Uses-64-Bit

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Watchdog: Temperature abort trigger disabled.

Starting attack in stdin mode...

Session..........: hashcat
Status...........: Running
Hash.Type........: macOS v10.8+ (PBKDF2-SHA512)
Hash.Target......: $ml$32362$3396d6468d2f40285777ee99cb7f5806aad94d10b...84d508
Time.Started.....: Wed Jul 25 08:45:56 2018 (9 secs)
Time.Estimated...: Wed Jul 25 08:46:05 2018 (0 secs)
Guess.Base.......: Pipe
Speed.Dev.#2.....:        0 H/s (0.00ms) @ Accel:4 Loops:1 Thr:512 Vec:1
Speed.Dev.#3.....:        0 H/s (0.00ms) @ Accel:8 Loops:2 Thr:1024 Vec:1
Speed.Dev.#*.....:        0 H/s
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0
Rejected.........: 0
Restore.Point....: 0
Candidates.#2....: [Copying]
Candidates.#3....: [Copying]

When I try to crack an md5 hash, I use the command line:
Code:
./hashcat -m 0 md5.txt
and this is the output I get:
Code:
hashcat (v4.1.0) starting...


OpenCL Platform #1: Apple
=========================
* Device #1: Intel(R) Core(TM) i7-3615QM CPU @ 2.30GHz, skipped.
* Device #2: HD Graphics 4000, 384/1536 MB allocatable, 16MCU
* Device #3: GeForce GT 650M, 256/1024 MB allocatable, 2MCU

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Raw-Hash

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

ATTENTION! Pure (unoptimized) OpenCL kernels selected.
This enables cracking passwords and salts > length 32 but for the price of drastically reduced performance.
If you want to switch to optimized OpenCL kernels, append -O to your commandline.

Watchdog: Temperature abort trigger disabled.

Initialized device kernels and memory...Abort trap: 6
#2
You should tell hashcat what it is supposed to do. All you told it is what hash to attack.
#3
(07-25-2018, 06:31 PM)undeath Wrote: You should tell hashcat what it is supposed to do. All you told it is what hash to attack.

How do I do that? Could you give an example please
#4
Code:
hashcat -m 7100 -a 0 hash.txt dict.txt