1. what is your goal here? do you need to do forensic analysis or just need to get your data back and login ? I think if you are not using full-disk-encryption you could trick the system by giving it a different "hash" and login with the password corresponding to the fake/replaced hash (see https://apple.stackexchange.com/question...n-a-script or https://www.reddit.com/r/hacking/comment..._password/). That said, I'm not a macOS user/expert and I therefore do not know if this is still possible or possible at all.
2. this seems perfectly fine. You are using a hash with 32894 iteration, what else do you expect ? you could/should try to use better and more GPUs, that's all you can do if it comes to better speed. On the other hand, you can try to make your attacks more clever by only using rules and words that make sense for your specific case (very specialized/decicated rules and words, hand-crafted).
2. this seems perfectly fine. You are using a hash with 32894 iteration, what else do you expect ? you could/should try to use better and more GPUs, that's all you can do if it comes to better speed. On the other hand, you can try to make your attacks more clever by only using rules and words that make sense for your specific case (very specialized/decicated rules and words, hand-crafted).