Piping CRUNCH with AIRCRACK-NG to eliminate dictionary file needed to crack Wi-Fi passwords.
This will feed the crunch generated passwords into the AIRCRACK-NG process instead of AIRCRACK-NG reading it off a test file. Specifically for Brute Force cracking the Wi-Fi password.
The following command can be used to start AIRCRACK-NG with input from CRUNCH:
crunch 8 8 | aircrack-ng -e [ESSID] -w – [file path to the .cap file]