i need to know how your hash is generated to answer correctly because when password and salt are part of it, there will be no easy way for you to recover any password
but lets assume and take your examples
crackme.txt contains your md5:salt
masks.txt contains the bruteforceinput but this needs the "hash" as prefix
but running this results in a bufferoverflow as 62^12 is more than hashcats max of 2^64 possibilites, so i reduced the keyspace to your input pass
masks.txt
hashcat --status -O -m10 -a3 crackme.txt masks.txt
this should result (i tested it with a shorter pass) in cracking your 2 examples BUT as you see, you need to know your "hash" beforehand, thus you will need to generate your masks also beforehand and then you need to remove these prefixes from the results found in your potfile
and as mentioned, lower upper and digits will result in a bufferoverflow for passes longer than 10
but lets assume and take your examples
crackme.txt contains your md5:salt
Code:
11b0c79af9ceb4a9d4ed1bb6f24aa6d8:50001711302155
7702deed0256ef03e5985276a8ecfffd:50001711302155
masks.txt contains the bruteforceinput but this needs the "hash" as prefix
Code:
?l?u?d,c07845847e682be54a8fc912963df26e?1?1?1?1?1?1?1?1?1?1?1?1
?l?u?d,a219d00bb4fe336bc48e955bf3863585?1?1?1?1?1?1?1?1?1?1?1?1
but running this results in a bufferoverflow as 62^12 is more than hashcats max of 2^64 possibilites, so i reduced the keyspace to your input pass
masks.txt
Code:
z9R6hdtFWagU,c07845847e682be54a8fc912963df26e?1?1?1?1?1?1?1?1?1?1?1?1
z9R6hdtFWagU,a219d00bb4fe336bc48e955bf3863585?1?1?1?1?1?1?1?1?1?1?1?1
hashcat --status -O -m10 -a3 crackme.txt masks.txt
this should result (i tested it with a shorter pass) in cracking your 2 examples BUT as you see, you need to know your "hash" beforehand, thus you will need to generate your masks also beforehand and then you need to remove these prefixes from the results found in your potfile
and as mentioned, lower upper and digits will result in a bufferoverflow for passes longer than 10