A little more on cracking wpa/wpa2 passphrases….
Why not bring in the GPU?
Fun little program called pyrit – it does seem to require a wordfile though, I may have to try piping in JTR like we did with aircrack-ng…
Anyway, here is a little tutorial https://code.google.com/p/pyrit/wiki/Tutorial
Basically you take the cap file you made using airodump-ng and do something like this:
(this one requires that you have imported passwords into it’s database)
pyrit –all-handshakes -r WPAcrack-01.cap attack_batch