05-08-2014, 11:27 AM
This is deep hashcat stuff, don't ask. Also using --keyspace and -s or -l will not do anything to the output. It's assumed you run --keyspace first and then plan your distributed attacks based on it (using -s and -l).