CHAPTER 4ATTACKING WPA-PROTECTED 802.11 NETWORKS

WPA/WPA2 vastly improves the security of wireless networks; however, the extra protection comes at the price of added complexity to the protocol. A brief introduction to WPA is provided in the introductory chapter of this book. Readers unfamiliar with the basics of WPA may wish to read it for background information. This chapter is focused on all of the currently known attacks against WPA.

Although WPA was developed with security in mind, it does have its own flaws that we can take advantage of. At a high level, WPA attacks can be broken down into two categories: attacks against authentication and attacks against encryption. Authentication attacks are the most common and yield direct access to ...

Get Hacking Exposed Wireless, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.