Originally Posted by
mmusket33
We have seen cases wherein aircrack-ng says the handshake is valid but Elcomsoft does not validate the handshake but will test the handshake. In several cases like this Elcomsoft actually cracked the WPA key. We will run brute force attacks against numeric strings 8 to 10 in length in such cases ONLY as you never know if you did not get the WPA key because the handshake was invalid or not. We prefer to just try and collect another handshake.
You might try wpaclean and see if elcomsoft accepts the handshake after that. If it does you can then throw as much time as you wish at the handshake.
Musket Teams