01-02-2018, 09:28 PM
hashcat64.exe -a 3 -m 9600 -w 3 -p : --gpu-temp-abort=90 --outfile-format=3 -i -1 ?l?s?d ?1?1?1?1?1?1?1?1?1 --username
This will iterate starting from length 1 and going out to a length that I know is impossible to bruteforce on office 2013. Speaking of impossible, you really really shouldn't be using brute force. You'd be much better off with a dictionary and some rules.
If you want to make the mask a little bit better, it'd be best to guess the length and then try to write a mask that looks something like this: ?l?l?l?l?l?s?d?d?d?d which would hit a password like "paswd%1234" which is roughly the format you were going for. This will lower the keyspace you have to check dramatically but it will still be too big for a brute force most likely and you will still want to use a dictionary + rules.
This will iterate starting from length 1 and going out to a length that I know is impossible to bruteforce on office 2013. Speaking of impossible, you really really shouldn't be using brute force. You'd be much better off with a dictionary and some rules.
If you want to make the mask a little bit better, it'd be best to guess the length and then try to write a mask that looks something like this: ?l?l?l?l?l?s?d?d?d?d which would hit a password like "paswd%1234" which is roughly the format you were going for. This will lower the keyspace you have to check dramatically but it will still be too big for a brute force most likely and you will still want to use a dictionary + rules.