Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Error UnicodeDecodeError hccapx
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi,

I've run benchmark and I got the following:

Hashmode: 0 - MD5

Speed.#1.........:  3990.5 MH/s (54.19ms) @ Accel:16 Loops:1024 Thr:1024 Vec:2

Hashmode: 100 - SHA1

Speed.#1.........:  1702.3 MH/s (63.47ms) @ Accel:8 Loops:1024 Thr:1024 Vec:1

Hashmode: 1400 - SHA2-256

Speed.#1.........:  749.5 MH/s (72.18ms) @ Accel:4 Loops:1024 Thr:1024 Vec:1

Hashmode: 1700 - SHA2-512

Speed.#1.........:  238.6 MH/s (56.67ms) @ Accel:16 Loops:64 Thr:1024 Vec:1

Hashmode: 22000 - WPA-PBKDF2-PMKID+EAPOL (Iterations: 4095)

Speed.#1.........:    82562 H/s (80.25ms) @ Accel:16 Loops:128 Thr:1024 Vec:1

Hashmode: 1000 - NTLM

Speed.#1.........:  7043.9 MH/s (61.45ms) @ Accel:64 Loops:512 Thr:1024 Vec:4

Hashmode: 3000 - LM

Speed.#1.........:  3696.1 MH/s (58.31ms) @ Accel:256 Loops:1024 Thr:64 Vec:1

Hashmode: 5500 - NetNTLMv1 / NetNTLMv1+ESS

Speed.#1.........:  4584.6 MH/s (94.64ms) @ Accel:64 Loops:512 Thr:1024 Vec:4

Hashmode: 5600 - NetNTLMv2

Speed.#1.........:  304.8 MH/s (88.72ms) @ Accel:16 Loops:128 Thr:1024 Vec:2

Hashmode: 1500 - descrypt, DES (Unix), Traditional DES

Speed.#1.........:  154.8 MH/s (87.31ms) @ Accel:16 Loops:1024 Thr:64 Vec:1

Hashmode: 500 - md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5) (Iterations: 1000)

Speed.#1.........:  2293.3 kH/s (90.80ms) @ Accel:16 Loops:1000 Thr:1024 Vec:1

Hashmode: 3200 - bcrypt $2*$, Blowfish (Unix) (Iterations: 32)

Speed.#1.........:    2468 H/s (30.47ms) @ Accel:2 Loops:8 Thr:12 Vec:1

Hashmode: 1800 - sha512crypt $6$, SHA512 (Unix) (Iterations: 5000)

Speed.#1.........:    34344 H/s (76.72ms) @ Accel:4 Loops:256 Thr:1024 Vec:1

Hashmode: 7500 - Kerberos 5, etype 23, AS-REQ Pre-Auth

Speed.#1.........: 47418.1 kH/s (71.42ms) @ Accel:128 Loops:32 Thr:64 Vec:1

Hashmode: 13100 - Kerberos 5, etype 23, TGS-REP

Speed.#1.........: 47150.9 kH/s (71.79ms) @ Accel:128 Loops:32 Thr:64 Vec:1

Hashmode: 15300 - DPAPI masterkey file v1 (Iterations: 23999)

Speed.#1.........:    14013 H/s (80.41ms) @ Accel:32 Loops:64 Thr:1024 Vec:1

Hashmode: 15900 - DPAPI masterkey file v2 (Iterations: 12899)

Speed.#1.........:    7577 H/s (68.57ms) @ Accel:2 Loops:256 Thr:1024 Vec:1

Hashmode: 7100 - macOS v10.8+ (PBKDF2-SHA512) (Iterations: 1023)

Speed.#1.........:    95244 H/s (55.26ms) @ Accel:2 Loops:255 Thr:1024 Vec:1

Hashmode: 11600 - 7-Zip (Iterations: 16384)

Speed.#1.........:    84321 H/s (77.08ms) @ Accel:2 Loops:4096 Thr:1024 Vec:1

Hashmode: 12500 - RAR3-hp (Iterations: 262144)

Speed.#1.........:    10419 H/s (79.56ms) @ Accel:1 Loops:16384 Thr:1024 Vec:1

Hashmode: 13000 - RAR5 (Iterations: 32799)

Speed.#1.........:    9133 H/s (90.68ms) @ Accel:8 Loops:256 Thr:1024 Vec:1

Hashmode: 6211 - TrueCrypt RIPEMD160 + XTS 512 bit (Iterations: 1999)

Speed.#1.........:    61466 H/s (52.70ms) @ Accel:16 Loops:32 Thr:1024 Vec:1

Hashmode: 13400 - KeePass 1 (AES/Twofish) and KeePass 2 (AES) (Iterations: 24569)

Speed.#1.........:    10462 H/s (211.63ms) @ Accel:32 Loops:128 Thr:1024 Vec:1

Hashmode: 6800 - LastPass + LastPass sniffed (Iterations: 499)

Speed.#1.........:  586.2 kH/s (87.68ms) @ Accel:4 Loops:499 Thr:1024 Vec:1

Hashmode: 11300 - Bitcoin/Litecoin wallet.dat (Iterations: 200459)

Speed.#1.........:    1138 H/s (59.49ms) @ Accel:1 Loops:1024 Thr:1024 Vec:1



When I use the hash mode: 1000, 0, etc. to both .cap and .hccapx file (https://drive.google.com/open?id=1Z0OI1W...3Woka8bp2p), I get the this error:


Code:
UnicodeDecodeError                        Traceback (most recent call last)

<ipython-input-64-45059f738655> in <module>()
----> 1 get_ipython().system('hashcat -m 1500 -a 3 -w 3 --status MIWIFI_2G.hccapx --custom-charset1=abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 ?1?1?1?1?1?1?1?1')


5 frames

/usr/lib/python3.6/codecs.py in decode(self, input, final)
    319        # decode input (taking the buffer into account)
    320        data = self.buffer + input
--> 321        (result, consumed) = self._buffer_decode(data, self.errors, final)
    322        # keep undecoded input until the next call
    323        self.buffer = data[consumed:]


UnicodeDecodeError: 'utf-8' codec can't decode byte 0x84 in position 619: invalid start byte


I've used the following command:

!hashcat -m 1500 -a 3 -w 3 --status MIWIFI_2G.hccapx --custom-charset1=abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 ?1?1?1?1?1?1?1?1

Hashcat version: v5.1.0-1789-gc7da6357

Why I'm getting those errors? Are the handshake files correct? Should I use a different hashcat version?

Thanks
Quote:when I use the hash mode: 1000, 0, etc. to both .cap and .hccapx file


see example hashes to declare what mode to use.

https://hashcat.net/wiki/doku.php?id=example_hashes

mode 1000 is NTML and does not use hccapx format.
mode 0 is MD5 which also does not use hccapx format.
Yes, I've discovered that for WPA, I only can use 2500, 16800 and 22000. Unfortunately, those hash types are slow. What I found interesting is getting similar H/s for a CPU and GPU (Colab) system of 60k and 80k, respectively. Is it real the limit? What can I modify on the command to speed up the process?

Thanks