Dictiionary Attack - how-to-question
I am new to hashcat - currently I am trying to get my (forgotten) itunes password from a itunes backup iOS 9 or older ("-m 14700") and I was wondering if anyone could tell me how to start a dictionary attack - I created a text file "password.txt" - containing passwords I recently used, the passwords are separated by comma ","

so what I did:

./hashcat -d 2 -m 14700 hash.txt -a 0 password.txt

I wonder whether the password.txt file is properly created and whether the syntax "-a password.txt" is correct - thnx in advance
You don't need -a 0 (optional)
Why -d 2 ? if you have several GPUs it's better to run hashcat on all GPUs (what you don't do here)
there are 2 built-in GPU´s -

* Device #1: Intel(R) Core(TM) i5-4260U CPU @ 1.40GHz, skipped

* Device #2: HD Graphics 5000, 1472/1536 MB (384 MB allocatable), 40MCU

so I chose -d 2 because -d 1 is skipped, maybe I am wrong -

you mean I skip -d 2 then both GPU´s will be running ?

concerning -a 0, I learned that I have to specify an attack mode and -a 0 is a dictionary attack -

you mean if I skip -a 0 then password.txt will be used as dictionary attack ?
-a 0 is default, so you can omit it. But adding it is not going to cause any problems.

The words in your wordlist must be delimited by a newline character not a comma.
-a 0 copied
concerning the words in a wordlist, my list contains 36 words and a special character, I thought that the attack mode -a 0 password.txt would do all the combinations of these words, if not how can I make the dictionary attack combine all the words listed in a text file ? I am asking because running the dictionary attack based on this list is a 3-second run, which is very short
you need to explain more clearly what you are trying to do.

What does combining mean in your situation ? how many words combined, any separator between the words, can one word occur multiple times within one password candidate (also next to each other) etc, etc, etc ?

What do you mean by the special characters ? where are these chars used ? only at the beginning ? one at the end ? in between the words ?

There is too little detail to give a clear answer.

Maybe you can just create or generate a wordlist since itunes algos (both -m 14700 and -m 14800) are slow (difficult to crack) algos anyway (otherwise, for fast algos like MD5 etc, a mask/hybrid/rule attack would probably be preferred)... althrough -m 14700 is actually much faster, so you are kind of lucky there.

The password candidate list can be generated with any programming/scripting language (like python/perl etc) i.e. pre-computed... as long as it is NOT too many combinations, because otherwise it would be a problem with disk space and I/O etc.
What I am trying to do: I am trying to crack my itunes version 9 backup password in order to get my fotos back, I did this in 2016. I think the password length is between 6 and 14 characters.

What I did up to now: I created a hash file
How I created the hash file: I started a perl script against my manifest.plist.

Then I registered at hashcat.net to learn more about hashcat dictionary OR mask attack which were told to be the only feasible means cracking passwords.

I usually create passwords in a way that the first word of the password starts with an upper-case letter followed by lower-case letters.
Then some of my recents passwords had the special character "@" followed by the current year, which was likely 2016, so the special character was in the between two expressions.

the command I entered was: ./hashcat -m 14700 Manifest1.txt -a 0 password.txt

The Manifest1.txt is the hash file created by the perl script.
The password.txt is the wordlist that contains all the words, special character (@) and digits that I have used in 2016, all these are listed line by line, no comma separatiion or similar

I understood dictionary attack in a way that all expressions listed are combined.

If dictionary attack fails I would then try mask attack. That´s why I am asking.

thnx in advance
A dictionary attack runs each word in your dictionary and applies rules if you specified any. What you describe would be a combinator attack but even that doesn't really fit your use case well.

You want a hybrid attack dict + mask.

Like this:
./hashcat -m 14700 Manifest1.txt -a 0 -j c password.txt '?s201?d'
i entered the command:
./hashcat -m 14700 Manifest1.txt -a 0 -j c password.txt '?s201?d'

I received:
?s201?d: No such file or directory

Is ?s201?d supposed to be a file ?
whops, minor typo on my part. Should be -a 6 not -a 0

?s201?d is a mask