Of course that is not good for attacking the hash, if you miss important information (the salt/key in general is known).
You could try to generate a list of salts (e.g. w/ maskprocessor and a suitable mask) and use this output (say "dict") as an external salt file (-e). In this way you search for the correct salt + bruteforce etc the password.
It is clear, that this takes way longer than knowing the salt!
You could try to generate a list of salts (e.g. w/ maskprocessor and a suitable mask) and use this output (say "dict") as an external salt file (-e). In this way you search for the correct salt + bruteforce etc the password.
It is clear, that this takes way longer than knowing the salt!