Skip to content

WPA2 - Personal

  • Authentication: PSK (4-way handshake)
  • Cipher: CCMP/AES (avoid TKIP/mixed modes)
    • TKIP is obsolete and highly vulnerable

Vulnerabilities

4-Way Handshake Capture

  • Listen for clients to connect to the WiFi AP and capture the 4-way handshake to decrypt it and recover the AP's PSK.
  • Exploitation: See 4-Way Handshake Capture

Clientless PMKID Capture

Vulnerable routers will include the PMKID in the first EAPOL frame it sends an associating client. The PMKID can be cracked to discover the PSK

Reference

WPS Weaknesses

  • Online PIN bruteforce
    • Requires weak lockouts on PIN attempts.
  • "Pixie Dust" - Offline PIN recovery
  • Weak/default PIN algorithms
    • Some vendors use predictable PIN algorithms.