I'm trying to hack my own WPA2 network for learning purposes.
I have the *.cap
file generated by aircrack-ng
tools after a WPA handshake.
I've tested by including my own password and a bunch of incorrect passwords on a wordlist and aircrack-ng
crack successfully. My password is 10 characters length, only uppercase letters and numbers, so I tried generating a wordlist with crunch
(10 characters length, uppercase and numbers only):
$ crunch 10 10 -f charset.lst ualpha-numeric -o wordlist.txt
But crunch weight estimation was stunning:
Crunch will now generate the following amount of data: 40217742840692736 bytes
38354628411 MB
37455691 GB
36577 TB
35 PB
Crunch will now generate the following number of lines: 3656158440062976
The wordlist is incredibly big. And I generated the wordlist by having clues about the lenght and characters involved. If I didn't know that It'd be even bigger.
I guess I know believe that bruteforce attacks on non trivial passwords is impossible, at least with pre generated wordlists.
Is there a way to let aircrack-ng
incrementally crack the password with a given length and charset?
What other sane options do I have to attack my password?