

We won't bother attempting a brute force / mask attack, since even a simple 6-character lowercase password could take as long as 19 years to crack on this hardware. Test platform: a wildly unsuitable mid-2010 iMac with an Intel Core i3 processor and 256MB ATI Radeon HD 4670 graphics card, running macOS 10.12.

It also largely applies to cracking any hash supported by hashcat (MD5, SHA1, NTLM, etc). This guide covers cracking a password-protected DOCX file 1 created with Word for Mac 2011 (which employs the same protection algorithm as Microsoft Word 2010). Cracking Microsoft Office password protection via hashcat, locally or in the cloud / docs / Cracking Microsoft Office password protection via hashcat, locally or in the cloud
