Hi,
I've run benchmark and I got the following:
Hashmode: 0 - MD5
Speed.#1.........: 3990.5 MH/s (54.19ms) @ Accel:16 Loops:1024 Thr:1024 Vec:2
Hashmode: 100 - SHA1
Speed.#1.........: 1702.3 MH/s (63.47ms) @ Accel:8 Loops:1024 Thr:1024 Vec:1
Hashmode: 1400 - SHA2-256
Speed.#1.........: 749.5 MH/s (72.18ms) @ Accel:4 Loops:1024 Thr:1024 Vec:1
Hashmode: 1700 - SHA2-512
Speed.#1.........: 238.6 MH/s (56.67ms) @ Accel:16 Loops:64 Thr:1024 Vec:1
Hashmode: 22000 - WPA-PBKDF2-PMKID+EAPOL (Iterations: 4095)
Speed.#1.........: 82562 H/s (80.25ms) @ Accel:16 Loops:128 Thr:1024 Vec:1
Hashmode: 1000 - NTLM
Speed.#1.........: 7043.9 MH/s (61.45ms) @ Accel:64 Loops:512 Thr:1024 Vec:4
Hashmode: 3000 - LM
Speed.#1.........: 3696.1 MH/s (58.31ms) @ Accel:256 Loops:1024 Thr:64 Vec:1
Hashmode: 5500 - NetNTLMv1 / NetNTLMv1+ESS
Speed.#1.........: 4584.6 MH/s (94.64ms) @ Accel:64 Loops:512 Thr:1024 Vec:4
Hashmode: 5600 - NetNTLMv2
Speed.#1.........: 304.8 MH/s (88.72ms) @ Accel:16 Loops:128 Thr:1024 Vec:2
Hashmode: 1500 - descrypt, DES (Unix), Traditional DES
Speed.#1.........: 154.8 MH/s (87.31ms) @ Accel:16 Loops:1024 Thr:64 Vec:1
Hashmode: 500 - md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5) (Iterations: 1000)
Speed.#1.........: 2293.3 kH/s (90.80ms) @ Accel:16 Loops:1000 Thr:1024 Vec:1
Hashmode: 3200 - bcrypt $2*$, Blowfish (Unix) (Iterations: 32)
Speed.#1.........: 2468 H/s (30.47ms) @ Accel:2 Loops:8 Thr:12 Vec:1
Hashmode: 1800 - sha512crypt $6$, SHA512 (Unix) (Iterations: 5000)
Speed.#1.........: 34344 H/s (76.72ms) @ Accel:4 Loops:256 Thr:1024 Vec:1
Hashmode: 7500 - Kerberos 5, etype 23, AS-REQ Pre-Auth
Speed.#1.........: 47418.1 kH/s (71.42ms) @ Accel:128 Loops:32 Thr:64 Vec:1
Hashmode: 13100 - Kerberos 5, etype 23, TGS-REP
Speed.#1.........: 47150.9 kH/s (71.79ms) @ Accel:128 Loops:32 Thr:64 Vec:1
Hashmode: 15300 - DPAPI masterkey file v1 (Iterations: 23999)
Speed.#1.........: 14013 H/s (80.41ms) @ Accel:32 Loops:64 Thr:1024 Vec:1
Hashmode: 15900 - DPAPI masterkey file v2 (Iterations: 12899)
Speed.#1.........: 7577 H/s (68.57ms) @ Accel:2 Loops:256 Thr:1024 Vec:1
Hashmode: 7100 - macOS v10.8+ (PBKDF2-SHA512) (Iterations: 1023)
Speed.#1.........: 95244 H/s (55.26ms) @ Accel:2 Loops:255 Thr:1024 Vec:1
Hashmode: 11600 - 7-Zip (Iterations: 16384)
Speed.#1.........: 84321 H/s (77.08ms) @ Accel:2 Loops:4096 Thr:1024 Vec:1
Hashmode: 12500 - RAR3-hp (Iterations: 262144)
Speed.#1.........: 10419 H/s (79.56ms) @ Accel:1 Loops:16384 Thr:1024 Vec:1
Hashmode: 13000 - RAR5 (Iterations: 32799)
Speed.#1.........: 9133 H/s (90.68ms) @ Accel:8 Loops:256 Thr:1024 Vec:1
Hashmode: 6211 - TrueCrypt RIPEMD160 + XTS 512 bit (Iterations: 1999)
Speed.#1.........: 61466 H/s (52.70ms) @ Accel:16 Loops:32 Thr:1024 Vec:1
Hashmode: 13400 - KeePass 1 (AES/Twofish) and KeePass 2 (AES) (Iterations: 24569)
Speed.#1.........: 10462 H/s (211.63ms) @ Accel:32 Loops:128 Thr:1024 Vec:1
Hashmode: 6800 - LastPass + LastPass sniffed (Iterations: 499)
Speed.#1.........: 586.2 kH/s (87.68ms) @ Accel:4 Loops:499 Thr:1024 Vec:1
Hashmode: 11300 - Bitcoin/Litecoin wallet.dat (Iterations: 200459)
Speed.#1.........: 1138 H/s (59.49ms) @ Accel:1 Loops:1024 Thr:1024 Vec:1
When I use the hash mode: 1000, 0, etc. to both .cap and .hccapx file (https://drive.google.com/open?id=1Z0OI1W...3Woka8bp2p), I get the this error:
I've used the following command:
!hashcat -m 1500 -a 3 -w 3 --status MIWIFI_2G.hccapx --custom-charset1=abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 ?1?1?1?1?1?1?1?1
Hashcat version: v5.1.0-1789-gc7da6357
Why I'm getting those errors? Are the handshake files correct? Should I use a different hashcat version?
Thanks
I've run benchmark and I got the following:
Hashmode: 0 - MD5
Speed.#1.........: 3990.5 MH/s (54.19ms) @ Accel:16 Loops:1024 Thr:1024 Vec:2
Hashmode: 100 - SHA1
Speed.#1.........: 1702.3 MH/s (63.47ms) @ Accel:8 Loops:1024 Thr:1024 Vec:1
Hashmode: 1400 - SHA2-256
Speed.#1.........: 749.5 MH/s (72.18ms) @ Accel:4 Loops:1024 Thr:1024 Vec:1
Hashmode: 1700 - SHA2-512
Speed.#1.........: 238.6 MH/s (56.67ms) @ Accel:16 Loops:64 Thr:1024 Vec:1
Hashmode: 22000 - WPA-PBKDF2-PMKID+EAPOL (Iterations: 4095)
Speed.#1.........: 82562 H/s (80.25ms) @ Accel:16 Loops:128 Thr:1024 Vec:1
Hashmode: 1000 - NTLM
Speed.#1.........: 7043.9 MH/s (61.45ms) @ Accel:64 Loops:512 Thr:1024 Vec:4
Hashmode: 3000 - LM
Speed.#1.........: 3696.1 MH/s (58.31ms) @ Accel:256 Loops:1024 Thr:64 Vec:1
Hashmode: 5500 - NetNTLMv1 / NetNTLMv1+ESS
Speed.#1.........: 4584.6 MH/s (94.64ms) @ Accel:64 Loops:512 Thr:1024 Vec:4
Hashmode: 5600 - NetNTLMv2
Speed.#1.........: 304.8 MH/s (88.72ms) @ Accel:16 Loops:128 Thr:1024 Vec:2
Hashmode: 1500 - descrypt, DES (Unix), Traditional DES
Speed.#1.........: 154.8 MH/s (87.31ms) @ Accel:16 Loops:1024 Thr:64 Vec:1
Hashmode: 500 - md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5) (Iterations: 1000)
Speed.#1.........: 2293.3 kH/s (90.80ms) @ Accel:16 Loops:1000 Thr:1024 Vec:1
Hashmode: 3200 - bcrypt $2*$, Blowfish (Unix) (Iterations: 32)
Speed.#1.........: 2468 H/s (30.47ms) @ Accel:2 Loops:8 Thr:12 Vec:1
Hashmode: 1800 - sha512crypt $6$, SHA512 (Unix) (Iterations: 5000)
Speed.#1.........: 34344 H/s (76.72ms) @ Accel:4 Loops:256 Thr:1024 Vec:1
Hashmode: 7500 - Kerberos 5, etype 23, AS-REQ Pre-Auth
Speed.#1.........: 47418.1 kH/s (71.42ms) @ Accel:128 Loops:32 Thr:64 Vec:1
Hashmode: 13100 - Kerberos 5, etype 23, TGS-REP
Speed.#1.........: 47150.9 kH/s (71.79ms) @ Accel:128 Loops:32 Thr:64 Vec:1
Hashmode: 15300 - DPAPI masterkey file v1 (Iterations: 23999)
Speed.#1.........: 14013 H/s (80.41ms) @ Accel:32 Loops:64 Thr:1024 Vec:1
Hashmode: 15900 - DPAPI masterkey file v2 (Iterations: 12899)
Speed.#1.........: 7577 H/s (68.57ms) @ Accel:2 Loops:256 Thr:1024 Vec:1
Hashmode: 7100 - macOS v10.8+ (PBKDF2-SHA512) (Iterations: 1023)
Speed.#1.........: 95244 H/s (55.26ms) @ Accel:2 Loops:255 Thr:1024 Vec:1
Hashmode: 11600 - 7-Zip (Iterations: 16384)
Speed.#1.........: 84321 H/s (77.08ms) @ Accel:2 Loops:4096 Thr:1024 Vec:1
Hashmode: 12500 - RAR3-hp (Iterations: 262144)
Speed.#1.........: 10419 H/s (79.56ms) @ Accel:1 Loops:16384 Thr:1024 Vec:1
Hashmode: 13000 - RAR5 (Iterations: 32799)
Speed.#1.........: 9133 H/s (90.68ms) @ Accel:8 Loops:256 Thr:1024 Vec:1
Hashmode: 6211 - TrueCrypt RIPEMD160 + XTS 512 bit (Iterations: 1999)
Speed.#1.........: 61466 H/s (52.70ms) @ Accel:16 Loops:32 Thr:1024 Vec:1
Hashmode: 13400 - KeePass 1 (AES/Twofish) and KeePass 2 (AES) (Iterations: 24569)
Speed.#1.........: 10462 H/s (211.63ms) @ Accel:32 Loops:128 Thr:1024 Vec:1
Hashmode: 6800 - LastPass + LastPass sniffed (Iterations: 499)
Speed.#1.........: 586.2 kH/s (87.68ms) @ Accel:4 Loops:499 Thr:1024 Vec:1
Hashmode: 11300 - Bitcoin/Litecoin wallet.dat (Iterations: 200459)
Speed.#1.........: 1138 H/s (59.49ms) @ Accel:1 Loops:1024 Thr:1024 Vec:1
When I use the hash mode: 1000, 0, etc. to both .cap and .hccapx file (https://drive.google.com/open?id=1Z0OI1W...3Woka8bp2p), I get the this error:
Code:
UnicodeDecodeError Traceback (most recent call last)
<ipython-input-64-45059f738655> in <module>()
----> 1 get_ipython().system('hashcat -m 1500 -a 3 -w 3 --status MIWIFI_2G.hccapx --custom-charset1=abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 ?1?1?1?1?1?1?1?1')
5 frames
/usr/lib/python3.6/codecs.py in decode(self, input, final)
319 # decode input (taking the buffer into account)
320 data = self.buffer + input
--> 321 (result, consumed) = self._buffer_decode(data, self.errors, final)
322 # keep undecoded input until the next call
323 self.buffer = data[consumed:]
UnicodeDecodeError: 'utf-8' codec can't decode byte 0x84 in position 619: invalid start byte
I've used the following command:
!hashcat -m 1500 -a 3 -w 3 --status MIWIFI_2G.hccapx --custom-charset1=abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 ?1?1?1?1?1?1?1?1
Hashcat version: v5.1.0-1789-gc7da6357
Why I'm getting those errors? Are the handshake files correct? Should I use a different hashcat version?
Thanks