Hashcat faster with a list, Is this true?
#1
Big Grin 
Im trying to crack a 10 character wpa2 password containing hexadecimal characters.
Ive being told that making a list or downloading a pre made list containg every combination with my desired characters and running it through hashcat would be much quicker than having hashcat generate each password is this correct?
#2
MUST be a rules. example rules, https://hashcat.net/forum/thread-5702.html
#3
This "idea" bases on the fact that the salt in WPA is the ESSID and there's a chance that two routers share the same ESSID. In such a case, the 2nd run could be done in no time. Today all Routers use their own, unique ESSID to prevent that. IOW, generating each password is the way to go.