Password Mutations

I’m stuck and hoping someone can give me a nudge in the right direction. I am working on the password mutation section in the password attacks module and cant seem to create a custom mutated list that contains the correct information for the known user. I’ve tried them against ssh, ftp, and smb using hydra and crackmapexec. Is is maybe because I’m doing it with the user rather than running it with the username.list? or am I just not setting the correct custom.rule. I’m lost please help.

You can use the rules provided and use another service available to go faster than using ssh. It takes time.

Also I have execute a Ssh Attack, and later 1h I decided to stop the command. Have you a idea of the time what to do you need?

The time 60:59h, how should it be read? I see it increasing, rather than decreasing

[DATA] max 4 tasks per 1 server, overall 4 tasks, 94043 login tries (l:1/p:94043), ~23511 tries per task
[DATA] attacking ssh://
[STATUS] 36.00 tries/min, 36 tries in 00:01h, 94007 to do in 43:32h, 4 active
[STATUS] 28.00 tries/min, 84 tries in 00:03h, 93959 to do in 55:56h, 4 active
[STATUS] 26.29 tries/min, 184 tries in 00:07h, 93859 to do in 59:31h, 4 active
[STATUS] 25.60 tries/min, 384 tries in 00:15h, 93659 to do in 60:59h, 4 active