06-05-2018, 05:27 AM
The time estimate is accurate. WPA is a slow hash, and you've requested a brute-force attack.
Most of the time, a full brute-force attack like the one you've crafted is a last-resort activity, after you've gone through wordlists, combinator, hybrid, mask, and other attacks. This works on the assumption that most passwords are not randomly generated, but rather contain human-selected elements that can dramatically reduce the attack space.
But if you truly know that this specific plaintext is exactly 7 characters long and was randomly generated - the only time that this attack would be what you'd start with - then there's no "faster" approach than the one you're taking.
Most of the time, a full brute-force attack like the one you've crafted is a last-resort activity, after you've gone through wordlists, combinator, hybrid, mask, and other attacks. This works on the assumption that most passwords are not randomly generated, but rather contain human-selected elements that can dramatically reduce the attack space.
But if you truly know that this specific plaintext is exactly 7 characters long and was randomly generated - the only time that this attack would be what you'd start with - then there's no "faster" approach than the one you're taking.
~