I'll capture the handshake for a WPA access point whose password is "zzzzz".
I'll create a dictionary file that has all the combinations from "aaaaa" to "zzzzz". I'll time how long Aircrack takes to crack the password. Then I'll use the built-in generator and see how long it takes. I think that's a fairly fair way of measuring it
Ah of course, you have me there. This generator would be useful to use against people who "know what they're doing", for instance when I was back home my wireless key was "qwertyaaaaazzzzz56789sk".Still, although not directly relevant to this discussion, a dictionary based attack will still outperform your approach since people tend to choose passwords using actual words, or modifications/combinations of existing words, instead of completely random letter sequences.
I'll got some time to spare now so I'm gonna make up the dictionary file and see how it compares to the "on-the-fly" version.Sounds like a good idea, it will be interesting to take part of your findings.