Bruteforce on 10 characters length WPA2 password

I'd look at OCLHashcat, as it let's you brute force with specific character sets and doesn't need to generate the list beforehand.

I'm not sure what you mean by "incrementally" however, if you mean stopping and starting OHC will let you do that.

In terms of cracking WPA2, you've got 3 options.

  1. Dictionary attacks
  2. Reaver attack against WPS (most successful option in majority of cases)
  3. Taking a wrench to the person and beating their password out of them

Ok, perhaps two options if you're not really wanting that password.

Brute force, unless you know a lot about the password and it's incredibly stupid (i.e. you know for certain it's an 8 character set of numbers) is going to be a non-starter.

Don't forget, strictly speaking there "shouldn't" be a way to break the password, so if none of these options seem viable, it just means you've got decent security. There may not be an answer as to how you can do it.


john --stdout --incremental:all | aircrack-ng -e ESSID -w - /home/user/input_wpa.cap

Edit the john conf file to change from 8 to 10