If your hashcat.2500.pot file contains not so much data to analyze you can build a bigger one based on wpa-sec cracked data:
Download the python client from here:
https://wpa-sec.stanev.org/hc/help_crack.py
It's open source (https://github.com/RealEnder/dwpa), so no virus inside.
run the client with this options (see ./help_crack.py --help for more options):
./help_crack.py --potfile wpasec.2500.pot
Now you will get a copy of all cracked networks (from your client) - incl. PSK! That is usefull for your analysis of keyspace
Upload your caps (wlancap2wpasec or via web interface) - so they will go threw this wordlists, too
Download the python client from here:
https://wpa-sec.stanev.org/hc/help_crack.py
It's open source (https://github.com/RealEnder/dwpa), so no virus inside.
run the client with this options (see ./help_crack.py --help for more options):
./help_crack.py --potfile wpasec.2500.pot
Now you will get a copy of all cracked networks (from your client) - incl. PSK! That is usefull for your analysis of keyspace
Upload your caps (wlancap2wpasec or via web interface) - so they will go threw this wordlists, too