07-19-2020, 10:28 AM
first of all it's infeasible to brute-force (and in most cases also mask attack) a hash with a password that is very long and random. It's mathematically imposiible. NOT doable. just do the math (hint: it involves the total cracking speed in H/s and the total keyspace).
to answer your question:
to answer your question:
Code:
hashcat -m 0 -a 3 --custom-charset2 ?u?d -w 3 -O hash.txt ?2?2?2?2?2?2?2?2?2?2?2