An interesting attack on WPA2 on unpatched devices.<p>This reminds me of the WPS reaver attack, which is a complete facepalm from an implementation perspective. Only 11,000 possible combinations, and trying 1 key every other second would net you the WPA password in < ~5 hours.<p>"In 2011, a security researcher named Stefan Viehböck discovered a flaw in this implementation. The concept he introduced was based on the following facts:<p>Out of the 8 digits of the PIN, the last digit is a checksum, which leaves 7 digits to guess.
The PIN is validated by dividing it into 2 halves. So first half leaves 10^4 = 10,000 guesses & 2nd half leaves 10^3 = 1000 guesses. So a total of 11000 guesses only, where it should be 10^8 = 100000000 guesses."<p>[1] <a href="https://kalilinuxtutorials.com/reaver-pixewps/" rel="nofollow">https://kalilinuxtutorials.com/reaver-pixewps/</a>