I am having a real issue cracking one NT hash i've pulled from my system for a Microsoft Account.
I used - PwDump8.2 I have an admin account unlocked on the system and can access most files. I know pieces of the password so I have used John The Ripper -Jumbo
john --wordlist=F:\Mutatewordlist.txt --format=NT hash.txt --fork=10
to run extensive mask wordlist attacks as well as running incremental which took just over 24hour to "complete"(.pot file is empty)
Can anyone help me understand what i have done wrong and how i can do this properly to get back into my main account? If someone could test the PwDump on their own Microsoft Account and verify it is outputing the correct NTLM Hash that would settle my mind a bit.