PDF -m 10500, limited to 32 password lenght - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: PDF -m 10500, limited to 32 password lenght (/thread-10863.html) |
PDF -m 10500, limited to 32 password lenght - mika09 - 07-07-2022 I want to crack a PDF with 38 characters password lenght (I know the lenght of the password). I have a dictionary that contains the password. The password hash have the header 4*4*128*-4*1*16, so I have to use -m 10500 to crack this PDF. When I run the command to crack the password hashcat shows: Minimum password length supported by kernel: 0 Maximum password length supported by kernel: 32 And fails with this error: * Device #1: ATTENTION! OpenCL kernel self-test failed. Your device driver installation is probably broken. See also: https://hashcat.net/faq/wrongdriver Aborting session due to kernel self-test failure. You can use --self-test-disable to override, but do not report related errors. When I run -m 10700 to crack other PDF hashes, maximum password lenght supported by kernel is 127. What I can do to crack this PDF? Thank you. RE: PDF -m 10500, limited to 32 password lenght - marc1n - 07-09-2022 You need to comply with the error you get. |