Our next attack targets a technology known as WPA or Wi-Fi protected access. As seen in our previous recipe WEP has a lot of drawbacks and vulnerabilities that could be exploited quite simply to gain access to and expose the information on networks protected with this protocol. Due to vulnerabilities and issues with WEP a replacement was sought, and an immediate replacement came in the form of WPA. WPA was designed to be an update or upgrade to WEP that can be implemented strictly to firmware upgrades on wireless network cards as well as wireless access points that were able to support the newer standard. When this new technology was introduced it solved a lot of the problems that WEP had brought to the table and made system administrators and consumers breathe a little bit easier.
WPA and WPA2 attacks
It is important to note that while most wireless cards were able to have a...