Reset Search
 

 

Article

Security Vulnerability Questions on WPA2 (Hashcat)

« Go Back

Information

 
TitleSecurity Vulnerability Questions on WPA2 (Hashcat)
Question
Security Vulnerability Questions on WPA2 (Hashcat)
Environment
Answer

Extreme Networks is aware of the recent WPA PSK brute force cracking technique that was discovered by the author of the popular 'hashcat' open source project. To our knowledge at this point, this technique applies generally to any wireless vendor (including EXTR) that implements WPA for wireless network security. There are two mitigations that can be effective against this attack:

  1. Choose a PSK password that is as strong as possible (ideally 16 characters including capital letters, numbers, and special characters)
  2. Change your PSK when it makes sense (yearly for example)  
  3. Use WPA2 Enterprise instead of WPA/WPA2. For the first mitigation, as with all password brute forcing attacks, password complexity is important to maximize.
​​We will provide any new updates as they become available.

References:
https://www.youtube.com/watch?v=tvdkRCNhwDo&t=18s
https://www.ins1gn1a.com/understanding-wpa-psk-cracking/
Additional notes

Feedback

 

Was this article helpful?


   

Feedback

Please tell us how we can make this article more useful.

Characters Remaining: 255