I highly recommend to use Hashcat instead of JohnTheRipper. Hashcat is an extremely powerful hash cracking tool and it supports Diskcryptor hashes. You can also use an advanced mask configuration to assist with the brute force process, adding in the characters you believe are already in place. Reference for Hashcat:
https://hashcat.net/wiki/doku.php?id=hashcat Hashcat works with "modes" with the "-m" flag for the command, so you can pick from the following modes for Diskcryptor:
20011 | DiskCryptor SHA512 + XTS 512 bit
20012 | DiskCryptor SHA512 + XTS 1024 bit
20013 | DiskCryptor SHA512 + XTS 1536 bit
To perform the mask attack, with the "-a 3" flag for the command, using the information you already know about the password you can follow this guide for more information:
https://hashcat.net/wiki/doku.php?id=mask_attackFor example this is the chat set for mask attacks:
?l = abcdefghijklmnopqrstuvwxyz
?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ
?d = 0123456789
?h = 0123456789abcdef
?H = 0123456789ABCDEF
?s = «space»!"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
?a = ?l?u?d?s
?b = 0x00 - 0xff
Your final command to crack a Diskcryptor hash might look like:
hashcat.exe -m 20011 -a 3 <mask> <hash>
Edit: Also if you don't have sufficient compute on your personal device, you can rent AWS spot GPUs to assist with rapidly cracking and just pay by the hour. Once you build the right mask this should take a day or so to compete. I've gone through a 10 trillion keyspace cracking hashes with Hashcat on AWS resources in a few hours. Yours should be much less given you know some of the password.