Thank to both very much indeed. I have just tried it and works better than simply generate all of them with maskprocessor (in addition I was trying it on a notebook without a GPU, so the improving is better in relative terms).
But it is still slow compared to a bruteforce attack (approx. 22 times slow). I mean the processing speed. Obviously in general it'll be quicker** than the bruteforce because the amount of possible words is being reduced exponentially.
** bf would take 95¹⁶H/(10374.7MH/s*60s/m*60m/h*24h/d*365d/y) = 1.34·10¹⁴ years and this hybrid attack only would take 95⁸H/(464.1MH/s*60s/m*60m/h*24h/d) = 165.4 days
Then the point is that if it was possible to use bruteforce attacks with rules directly, the speed could improve 22 times (more or less) reducing the total time to approx. 7 days (with my devices, of course).
Code:
$ mp64 ?a?a?a?a?a | hashcat hash.file -m0 -a0 -w3 -O -r double.rule
Speed.Dev.#1.....: 2371.9 kH/s (0.70ms)
Speed.Dev.#2.....: 3181.1 kH/s (5.72ms)
$ mp64.bin '?a?a?a' | hashcat hash.file -m0 -a0 -w3 -O -r append-aa.rule -r double.rule
Speed.Dev.#1.....: 15189.4 kH/s (34.03ms)
Speed.Dev.#2.....: 464.1 MH/s (86.00ms)
$ hashcat hash.file -m0 -a3 -w3 -O
Speed.Dev.#1.....: 108.7 MH/s (32.15ms)
Speed.Dev.#2.....: 10374.7 MH/s (64.40ms)
But it is still slow compared to a bruteforce attack (approx. 22 times slow). I mean the processing speed. Obviously in general it'll be quicker** than the bruteforce because the amount of possible words is being reduced exponentially.
** bf would take 95¹⁶H/(10374.7MH/s*60s/m*60m/h*24h/d*365d/y) = 1.34·10¹⁴ years and this hybrid attack only would take 95⁸H/(464.1MH/s*60s/m*60m/h*24h/d) = 165.4 days
Then the point is that if it was possible to use bruteforce attacks with rules directly, the speed could improve 22 times (more or less) reducing the total time to approx. 7 days (with my devices, of course).