So, I will explain the principle of work. It would be a shame, after a long time when you try to open a password document, you encounter an error opening. It would be superfluous to recall that files of a similar size should be downloaded separately, not as part of other downloads and with closed browsers. A cosmic number of keyboard shortcuts was generated there, they are filtered by the most common ones maybe your password will appear.
The only problem for you is that only the archive on the “dictionary” of the txt-format weighs about 14 GB.
As for the author of the article, he was rarely let down by a single dictionary. The network is full of them, and they are equally useless, and you yourself will understand this. I warn you in advance - avoid old foreign dictionaries dating back to 2010. The password, and not only from Wi-Fi, can be found in other ways. Neither aircrack - ng alone are alive hackers. What is the likelihood that the dictionary you downloaded or compiled will contain the combination presented above? The network mask is unknown, brute force will have to be blind. Alas, this is the problem of similar techniques: a dictionary should include, among others, the password invented by the victim. The method for decrypting APs considered here with the encryption classes WEP, WPA, WPA2 is based on a brute force attack, that is, dictionary search. which is achieved simply by the pointless “knocking” of the user on the keyboard. So I warn you right away: all of your manipulations may turn out to be meaningless, should the user use an arbitrary combination of the type when protecting his wireless access point: The first thing you should know is ABSOLUTELY ALL the actions given in such articles without a VERY good dictionary (for the utility aircrack including) when breaking password, which includes countless possible password combinations, not more than rat race.