Nothing special. I have my own network WPA2/AES with WPS off and I'm seeing what I can do to crack it just for the practice and interest of doing it. The only known advantage I'm giving myself is that I know the only characters used are A-Z and 0-9 and it is exactly 12 characters. I easily captured my own handshake by using airodump and aireplay. The next step in brute forcing is to plug in a wordlist. The wordlist must contain the password to work. To make a wordlist using crunch that had all possibilities of exactly 12 characters AZ09 is measured in petabytes. I'm trying to find a way to feed the same list of passwords in a far more manageable way. I imagine the list would take ages to compile and the estimated crack time even if I had the list and could use it seems to be longer than a lifetime anyways.
My goal I want to accomplish is feeding is a wordlist to aircrack where the wordlist continued both creating and deleting itself at roughly the same rate. This way the wordlist could take up minimal space while still covering all possibilities.