
You can pipe crunch directly into Aircrack-ng to eliminate the need to create a.I have also attempted a brute force on my own wifi using crunch to generate passwords.


Aircrack-ng really is brilliant although it does have some limitations. I'm currently developing similar technologies. What other sane options do I have to attack my password? Is there a way to let aircrack-ng incrementally crack the password with a given length and charset? I guess I know believe that bruteforce attacks on non trivial passwords is impossible, at least with pre generated wordlists. If I didn't know that It'd be even bigger. And I generated the wordlist by having clues about the lenght and characters involved. My password is 10 characters length, only uppercase letters and numbers, so I tried generating a wordlist with crunch (10 characters length, uppercase and numbers only): $ crunch 10 10 -f charset.lst ualpha-numeric -o wordlist.txtīut crunch weight estimation was stunning: Crunch will now generate the following amount of data: 40217742840692736 bytesĬrunch will now generate the following number of lines: 3656158440062976 I've tested by including my own password and a bunch of incorrect passwords on a wordlist and aircrack-ng crack successfully. I have the *.cap file generated by aircrack-ng tools after a WPA handshake. I'm trying to hack my own WPA2 network for learning purposes.
