technically, you are not "cracking AES". AES is a cipher, an encryption/decryption algorithm with fixed key lengths (the keys are just a bunch of random bytes).
what you are instead doing is to crack a keepass hash, which has a KDF (key derivation function) that starts from a password and derives a random key. This sometimes is directly the AES key that decrypts the data, but often (especially when it comes to full disk encryption software, like TrueCrypt/VeraCrypt/Bitlocker etc) is a layer above i.e. a key that decrypts another key to make the "password change" mechanism fast and unproblematic (less data change/corruption possible).
Therefore, while AES is an encryption algorithm that can be reversed (you can go either way, encrypt and decrypt), there is a step before that (the heavy part) that derives a key from the user password (one-way hashing function) ... so you aren't really cracking AES, but I would say, you are cracking a "keepass hash" (because AES is not the heavy part, the KDF is)
what you are instead doing is to crack a keepass hash, which has a KDF (key derivation function) that starts from a password and derives a random key. This sometimes is directly the AES key that decrypts the data, but often (especially when it comes to full disk encryption software, like TrueCrypt/VeraCrypt/Bitlocker etc) is a layer above i.e. a key that decrypts another key to make the "password change" mechanism fast and unproblematic (less data change/corruption possible).
Therefore, while AES is an encryption algorithm that can be reversed (you can go either way, encrypt and decrypt), there is a step before that (the heavy part) that derives a key from the user password (one-way hashing function) ... so you aren't really cracking AES, but I would say, you are cracking a "keepass hash" (because AES is not the heavy part, the KDF is)