Our next attack in this chapter is against the technology known as WPS or Wi-Fi Protected Setup. This technology was introduced over a decade ago as a way to simplify the configuration of clients to a wireless network. The features were actually targeted towards consumers and those who do not have IT backgrounds, or those with IT heavy backgrounds that simply wish to purchase a computer or other device and hit a couple of buttons and have connection to their wireless network. If we just consider this capability or feature, then WPS has actually done its job quite effectively. However, there are security risks, which is why we are talking about it and learning how to exploit it in this particular recipe. But before we get too far, let's delve into the mechanics of WPS just a little bit more to set up this recipe.
Attacking WPS
WPS will only work when both the router and the...