A researcher has claimed he has discovered a new technique to crack the wireless password of routers using WPA/WPA2 WiFI security
A researcher has claimed he has discovered a new technique to crack the wireless password of routers using WPA/WPA2 WiFI security. Jens Steube discovered this new technique, who is the creator of the popular Hashcat password cracking tool and said that technique was discovered accidentally while looking for ways to crack the new WPA3 security standard. “This attack was discovered accidentally while looking for new ways to attack the new WPA3 security standard. WPA3 will be much harder to attack because of its modern key establishment protocol called "Simultaneous Authentication of Equals" (SAE).” said in the post published by Jens Steube Previously in order to crack WPA/WPA2 security attacker needed to wait for the user to login into the network and capture the full handshake process. In the new method, it is Performed on the RSN IE (Robust Security Network Information Element) of a single EAPOL frame. This technique will work on all 802.11i/p/q/r networks with roaming functions enabled.