Unfortunately I see some logic flaws in these BS arguments about "ZOMG 130298984938439 dif possibilities" Namely the password itself would have to be absolute, and use a ton of randoms alphanumerics and be very long and annoying to input. The cracker doesn't have a clue what the pass is, but I'm betting it's not going to be that complex, nor that long based on some of the supposed "secure" employers I've worked at: That and the "luck" factor. You don't know wtf the password is, so assuming it's going to be something ridiculous by default is flawed. So they may indeed have found the correct one with the luck factor. Blah blah saying this and that is 20490249029409720742 long so it's fool proof makes you a fool. Lol, I remember years back people yapping about how the speed of light/sound/earth is flat… is absolute, and nothing could go faster blah blah, LONG proved false and plain stupidity to assume most-anything is "absolute." It's just not with in the scope of current measurement standards. Just like Encryption is NEVER going to be "absolute," in actuality it's just "more secure" vs another form of encryption. WPA can be cracked by PTW method quite easily with a days worth of packets or less of you've got ARP injection kicking in. WPA in some instances can be cracked faster than WEP if you get the needed magic-packet.
RemoteExploit forums will clown any of you claiming WPA is all this and that. For the script kiddie, sure, but for folks that KNOW wtf they are doing, WPA isn't much of an obstacle. WPA2 is another matter, but not impossible. Plenty of people cracking all kinds of shit, and preferring to keep their mouths SHUT about it, and keep exploiting Vs boasting about their efforts and having the security community INCREASE standards, thus making the cracker's life even more hassle. Silence is worth more than the 15min of fame bragging. Look at bump-keys… LONG known security flaw in near 99% of locks in American house-holds. But up until recently the stupid locksmithing community just kept it a secret, lol!