[New Method] Aircloud-Ng -- Crack WPA/WPA2 in the Cloud
An online wireless password recovery application, written in python,
using aircrack-ng. Our services are free, if we don't find the passphrase for you! :)
Make sure you upload a dump file, which contains only one valid handshake! The application can't handle a capture file with more than one handshakes.
Estimated cracking time if server load is empty ~ 4 hours
Estimated cracking time if server load is full ~ 24 hours
It usually takes a few minutes to receive the e-mail with the session id!