Hi.
I'm trying to make myself familiar with hashcat.
I would like to get the right command arguments to crack 16 bytes crypt to 16 bytes plain using AES-128 (also 16 bytes).
All hex!
When I use a mask of 15 bytes only, it works.
17 bytes is beyond hashcat design.
Can I do something to make this 16 bytes mask work?
Thanks
I'm trying to make myself familiar with hashcat.
I would like to get the right command arguments to crack 16 bytes crypt to 16 bytes plain using AES-128 (also 16 bytes).
All hex!
Code:
$ hashcat-7.1.2>hashcat -m 26401 hashes.txt -o cracked.txt -a 3 ?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h -w 4
...
OpenCL API (OpenCL 3.0 CUDA 13.0.84) - Platform #1 [NVIDIA Corporation]
=======================================================================
* Device #01: NVIDIA GeForce RTX 2080 SUPER, 8191/8191 MB (2047 MB allocatable), 48MCU
./OpenCL/m26401_a3-optimized.cl: Pure kernel not found, falling back to optimized kernel
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 16
Minimum salt length supported by kernel: 0
Maximum salt length supported by kernel: 51
Hashes: 2 digests; 2 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Not-Iterated
* Single-Salt
* Brute-Force
Watchdog: Temperature abort trigger set to 90c
Host memory allocated for this attack: 1065 MB (51006 MB free)
Integer overflow detected in keyspace of mask: ?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h
Started: Thu Oct 09 17:25:39 2025
Stopped: Thu Oct 09 17:25:42 2025
When I use a mask of 15 bytes only, it works.
17 bytes is beyond hashcat design.
Can I do something to make this 16 bytes mask work?
Thanks