In general you would use a command like this:
instead of -2 you could also use --custom-charset2 (or any other custom charset, like -4, -3, -2, -1 and use it within the mask with ?4, ?3, ?2, ?1 respectively).
But there is a big problem here: mask attacks of course try all possibilities and therefore are most of the time not the most clever approach, especially if it comes to slow hash types like itunes... the length matters a lot here and you are already trying lengths that get infeasible to crack within a reasonable time frame (months to years).
I would suggest looking into dictionary based attacks combined with rules etc (see https://hashcat.net/wiki/).
Brute-forcing or mask attack are not always the most clever attacks... you need to find more efficient/targetted approaches that are more feasible than just "brute-force it".
Code:
hashcat -m 14700 -a 3 -w 3 --increment --increment-min 8 -2 ?u?l?d@ extracted_hash.txt ?u?2?2?2?2?2?2?2?2?2
instead of -2 you could also use --custom-charset2 (or any other custom charset, like -4, -3, -2, -1 and use it within the mask with ?4, ?3, ?2, ?1 respectively).
But there is a big problem here: mask attacks of course try all possibilities and therefore are most of the time not the most clever approach, especially if it comes to slow hash types like itunes... the length matters a lot here and you are already trying lengths that get infeasible to crack within a reasonable time frame (months to years).
I would suggest looking into dictionary based attacks combined with rules etc (see https://hashcat.net/wiki/).
Brute-forcing or mask attack are not always the most clever attacks... you need to find more efficient/targetted approaches that are more feasible than just "brute-force it".