O.K. So here is how I start
I run "wifite" it captures my handshake, yes on my own network
it saves it as mymac.cap
To verify it is my mac I run "airodump-ng mon0"
They MAC addresses match perfectly
so then I run
"crunch 8 12 abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWQ YZ | aircrack-ng -bssid 00:01:02:03:04:05 -w- captured.cap"
I am running this because my password contains upper case and lower case characters, it is 11 characters long so I am using between 8 and 12 for testing purposes. It is also commonly what most people would use as far as length.
For starters when I do this it says it is creating a MASSIVE file, somewhere around 192 PetaBytes or some other ridicilous figure, may not be as high as I said ...
The other problem I am encountering is it says the MAC ADDRESS is invalid. How is this possible ? This is my biggest question.
My other question is, I know for a FACT my own password does not contain anything like dictionary words and is very complex. I realize it will take pry a couple weeks to crack. That's OK. This is a separate laptop, so I can leave it running off to the side.
So once it recognizes the MAC ADDRESS (I'm hoping someone here can address that) how do I get it to scan all available characters without generating such a massiive password list that will more than take up the 50 gigs I have for this virtual drive. Even if I assigned all 500 GB this file wouldn't fit. Ideas ?
P.S. I tried multiple dictionary files, of course none of them worked because as I stated my password is complex.