08-04-2020, 01:09 AM
don't post hashes here, see https://hashcat.net/forum/announcement-2.html
I think only the last 3 ones are valid hashes, the last three load perfectly fine for me and seem to crack (e.g. for one of them the password seem to be p*rnhub).
brute-force or mask attack doesn't seem to be a very clever attack for those 20,000 iterations (quite slow), I would instead suggest a rule-based attack (dictionary based, see: https://hashcat.net/wiki/doku.php?id=rule_based_attack).
I think only the last 3 ones are valid hashes, the last three load perfectly fine for me and seem to crack (e.g. for one of them the password seem to be p*rnhub).
brute-force or mask attack doesn't seem to be a very clever attack for those 20,000 iterations (quite slow), I would instead suggest a rule-based attack (dictionary based, see: https://hashcat.net/wiki/doku.php?id=rule_based_attack).