Skip to main content

Wireless Security

Quick Hardening Checklist

[ ] Change default SSID and admin credentials
[ ] Use WPA3 (or WPA2 minimum — never WEP/WPS/legacy WPA)
[ ] Apply strong passphrase (20+ chars)
[ ] Disable internet-based administration
[ ] Disable ICMP from untrusted interfaces
[ ] Enable MAC filtering (where appropriate)
[ ] Use captive portal for guest access
[ ] Segment guest and corporate networks (separate VLANs)

Cryptographic Protocols

ProtocolStatusNotes
WEPBroken — do not useTrivially cracked
WPACompromised — avoidTKIP weaknesses
WPSVulnerable — disablePIN brute-force attack
WPA2 (CCMP/AES)Current standardVulnerable to KRACK — patch required
WPA3RecommendedSAE, CCMP-128 minimum, Enterprise-192 mode

KRACK (Key Reinstallation Attack) — affects WPA2 by replaying cryptographic handshake messages. Vendor patches exist; always keep firmware updated.


WPA2 vs WPA3

FeatureWPA2WPA3
Auth methodPSK (Pre-Shared Key)SAE (Simultaneous Auth of Equals)
EncryptionCCMP-128 (AES)CCMP-128 minimum, GCMP-256 (Enterprise)
Forward secrecyNoYes
Brute-force resistanceLowerHigher
Enterprise modeRADIUS + 802.1XRADIUS + 802.1X + 192-bit keys

Network Modes

ModeDescription
PersonalPre-shared passphrase (home/small office)
EnterpriseRADIUS server + 802.1X — per-user credentials
Enterprise 192-bitWPA3 only — larger cryptographic keys

Common Wireless Attacks

AttackDescription
Evil twin / rogue APSpoofed AP to intercept traffic
KRACKReplay attack against WPA2 handshake
Deauth floodForces clients to reconnect (used pre-attack)
WPS PIN brute-forcePIN space only 11,000 combos — trivially broken
WardrivingScanning for open/weak networks while mobile
BluejackingUnsolicited Bluetooth messages
BluesnarfingUnauthorized access to Bluetooth device data