07-25-2018, 05:03 PM
I am trying to crack my mac password. I have made a PBKDF2-SHA512 hash using a tutorial. When I try to crack it with hash cat. I use the following command line.
And this is the output it gives me. The progress and the hashrate is the exact same after about 2 hours.
When I try to crack an md5 hash, I use the command line:
and this is the output I get:
Code:
./hashcat -m 7100 hash.txt
And this is the output it gives me. The progress and the hashrate is the exact same after about 2 hours.
Code:
OpenCL Platform #1: Apple
=========================
* Device #1: Intel(R) Core(TM) i7-3615QM CPU @ 2.30GHz, skipped.
* Device #2: HD Graphics 4000, 384/1536 MB allocatable, 16MCU
* Device #3: GeForce GT 650M, 256/1024 MB allocatable, 2MCU
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Slow-Hash-SIMD-LOOP
* Uses-64-Bit
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Watchdog: Temperature abort trigger disabled.
Starting attack in stdin mode...
Session..........: hashcat
Status...........: Running
Hash.Type........: macOS v10.8+ (PBKDF2-SHA512)
Hash.Target......: $ml$32362$3396d6468d2f40285777ee99cb7f5806aad94d10b...84d508
Time.Started.....: Wed Jul 25 08:45:56 2018 (9 secs)
Time.Estimated...: Wed Jul 25 08:46:05 2018 (0 secs)
Guess.Base.......: Pipe
Speed.Dev.#2.....: 0 H/s (0.00ms) @ Accel:4 Loops:1 Thr:512 Vec:1
Speed.Dev.#3.....: 0 H/s (0.00ms) @ Accel:8 Loops:2 Thr:1024 Vec:1
Speed.Dev.#*.....: 0 H/s
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0
Rejected.........: 0
Restore.Point....: 0
Candidates.#2....: [Copying]
Candidates.#3....: [Copying]
When I try to crack an md5 hash, I use the command line:
Code:
./hashcat -m 0 md5.txt
Code:
hashcat (v4.1.0) starting...
OpenCL Platform #1: Apple
=========================
* Device #1: Intel(R) Core(TM) i7-3615QM CPU @ 2.30GHz, skipped.
* Device #2: HD Graphics 4000, 384/1536 MB allocatable, 16MCU
* Device #3: GeForce GT 650M, 256/1024 MB allocatable, 2MCU
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Applicable optimizers:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Raw-Hash
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
ATTENTION! Pure (unoptimized) OpenCL kernels selected.
This enables cracking passwords and salts > length 32 but for the price of drastically reduced performance.
If you want to switch to optimized OpenCL kernels, append -O to your commandline.
Watchdog: Temperature abort trigger disabled.
Initialized device kernels and memory...Abort trap: 6