Wordpress hashes with masking
#1
Hello guys,
I run hashcat on my:
System: Ubuntu 12.04 LTS 32 bits
ProcessorL AMD Phenom(tm) II X2 545 Processor × 2
RAM: 4 GB RAM

What I need is to crack wordpress hashes I assume they are standard wordpress auto generated password which contains of 12 characters which are lowercaser and uppercase letters and digits, therefore I run this command on my terminal:
Quote:./hashcat-cli32.bin -m 400 -a 3 --pw-min=12 --pw-max=12 -o rockyou.txt --remove hashfile.all ?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d

The problem is time this is my console output info:
Quote:Input.Mode: Mask (?l?u?d?l?u?d?l?u?d?l?u?d) [12]
Index.....: 0/1 (segment), 2088270645760000 (words), 0 (bytes)
Recovered.: 0/15 hashes, 0/15 salts
Speed/sec.: - plains, 134 words
Progress..: 3869740/2088270645760000 (0.00%)
Running...: 00:07:57:57
Estimated.: 131:19:52:29

As you see I run hashcat almost 8 hours and nothing seems to be find up to now. Is there any way to write a rule to wordpress hashes or run this process in any way faster ?
For that it is strange for me that hashacat only checks 130-150 words per second - doesn't seem to me to be ridiculous number with all the respect I assume that I made something wrong

The second question is hascat session restore can I restore the session if I reboot my system and the hashcat starts searching from the point where it previously ended ?
#2
https://hashcat.net/wiki/doku.php?id=mask_attack