Wireless hacking – WPA/WPA2 – Social engineering (Part 4)

The insufficiency of brute-force In more realistic circumstances, a WPA network would not be as easy (as the previous example seemed to suggest) to penetrate. Everything comes down to the strength of the password, and these passwords are often very hard to crack. This is especially true if the routers/access-points are pre-configured by the manufacturer…

Wireless hacking – WPA/WPA2 - Brute force (Part 3)

  As mentioned above, the WPA/WPA2 standard was meant to fix some of the vulnerabilities found in the WEP standard; this also included the attack performed previously in this report. There are some flaws found in the current WPA/WPA2, but there is currently no logical or statistical way that can be used to make the…

Wireless hacking - introduction (Part 1)

With the radical increase of mobile devices, computers and the exponentially increasing amount of IoT devices we have seen in the last decade, wireless ethnology has become an essential part of the way we communicate with the world. It clearly wouldn’t be very practical to have a Ethernet cable connected to every device at home…