O'Reilly logo

Hacking Exposed Wireless, Third Edition by Johnny Cache, Joshua Wright

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 4

ATTACKING WPA-PROTECTED 802.11 NETWORKS

WPA/WPA2 (herein “WPA”) vastly improves the security of Wi-Fi networks; however, the extra protection comes at the price of added complexity to the protocol. A brief introduction to WPA is provided in Chapter 1. Readers unfamiliar with the basics of WPA may wish to read it for background information. This chapter is focused on the currently known attacks against WPA.

Although WPA was developed with security in mind, it does have its own flaws that we can take advantage of. At a high level, WPA attacks can be broken down into two categories: attacks against authentication and attacks against encryption. Authentication attacks are the most common and yield direct access to the wireless network. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required