WPA and WPA2 attacks
Our next attack targets a technology known as WPA or Wi-Fi protected access. As seen in our previous recipe WEP has a lot of drawbacks and vulnerabilities that could be exploited quite simply to gain access to and expose the information on networks protected with this protocol. Due to vulnerabilities and issues with WEP a replacement was sought, and an immediate replacement came in the form of WPA. WPA was designed to be an update or upgrade to WEP that can be implemented strictly to firmware upgrades on wireless network cards as well as wireless access points that were able to support the newer standard. When this new technology was introduced it solved a lot of the problems that WEP had brought to the table and made ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access