Just to further prove the usefulness of this I just used the same password list the church of the wifi used to make their tables in my experiment.
r00t@infected ~ $ pyrit -e NETGEAR -f final-wordlist.txt passthrough | cowpatty -d - -r wpa-01.cap -s NETGEAR
cowpatty 4.3 - WPA-PSK dictionary attack. <firstname.lastname@example.org>
Collected all necessary data to mount crack against WPA/PSK passphrase.
Starting dictionary attack. Please be patient.
Using STDIN for hashfile contents.
key no. 10000: 123456pnb
key no. 20000: 1Tokenof
As you can see I blew through their list of the most common passwords in 104 seconds. Pretty cool stuff.
key no. 970000: waegbarer
key no. 980000: withstood
key no. 990000: yc26njw4xd
Unable to identify the PSK from the dictionary file. Try expanding your
passphrase list, and double-check the SSID. Sorry it didn't work out.
990100 passphrases tested in 104.51 seconds: 9473.97 passphrases/second