I'm doing an educational hash research. I generated MD5 hash using online tools and cracked it within a second using Hashcat and certain wordlist (yes, one second). Then I produced a WPA handshake using this same password that I used for MD5. I tried to crack it with aircrack-ng using the very same wordlist. What I found really surprising was that I couldn't crack it within an half hour. So there are two possibilities here:
Aircrack-ng is significantly slower than Hashcat
WPA handshake is significantly slower hash function than MD5
Which one it is? Thanks