What is WPA2 (WiFi Protected Access 2)?
WPA2 provides business and home WiFi users with a high degree of assurance that only authorized users can access their wireless network.
Based on the IEEE 802.11i standard, WPA2 provides government-grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm FIPS 140-2, same 802.1x-based authentication.
There are two versions of WPA2: WPA2-Personal and WPA2-Enterprise:
- WPA2-Personal protects against unauthorized network access using a set password.
- WPA2-Enterprise verifies network users through a server. WPA2 is backward compatible with WPA.
Vulnerability discovered in WPA2 . protocol
On October 16, 2017, security researchers disclosed a high-severity vulnerability in the WPA2 protocol, making it possible for attackers to eavesdrop on WiFi traffic passing between computers and other devices. access point.
The Proof-Of-Concept exploit attack known as KRACK (Key Reinstallation Attacks) affects the core WPA2 protocol itself and is effective against devices running Android, Linux, Apple, Windows and OpenBSD operating systems, as well as MediaTek Linksys and many other types of operating systems running on the devices. Vendors then provided patches and updates to users to fix this vulnerability.
You should read it
- How to hack WiFi passwords with holes on WPA / WPA2
- Compare 4 types of security WiFi WEP, WPA, WPA2 and WPA3
- How to Hack Wi Fi WPA/WPA2 with Kali Linux
- Switch to WPA / WPA2-Enterprise encryption
- Microsoft silently patched the KRACK WPA2 security hole
- Learn about WPA3, the latest WiFi security standard today