MTeams has long stated that the tool of choice for WPA cracking is a windows program called elcomsoft.
However for small dictionaries like rockyou and commanpassword you can expand the alterations of the word using john as indicated in this thread. This increases the chances of a hit.
See:
https://forums.kali.org/showthread.p...ht=john+ripper
When running search programs like varmacscan or handshakeharvest MTeams runs a john aircrack passthru in the background against handshakes captured.
john --wordlist=/root/wordlist --rules:modified_single --stdout | aircrack-ng -e "ESSID" -w - /root/Filename.cap
If no hit numeric strings 8 thru 10 are run and then on to large WPA password files.
If you have networks with stationary essid the production of pmk is practicable.
The setups for both types of passthru are covered in the referenced thread.
If the downloads cannot be obtained please report here and MTeams will post for download
MTeams