I'm trying to crack my own WPA2 password with a mask attack, its a lowercase decimal password exactly 11 characters long, I've set my charset to only use lowercase and decimal, I've then set the password length to only try 11 character passwords yet the output shows a 10+ year estimate
http://i.imgur.com/nULq4aX.png
Code:
oclHashcat64.exe -a 3 -m 2500 --session=all -o "C:\Users\me\Downloads\hashcat-0.49\hashcatgui\capture_found.txt" --outfile-format=3 --potfile-disable -w 2 --gpu-temp-abort=90 -i --increment-min=11 --increment-max=11 -1 ?l?d "C:\Users\me\Downloads\capture.cap" ?1?1?1?1?1?1?1?1?1?1?1
http://i.imgur.com/nULq4aX.png