WAP2- PSK

WPA2-PSK Vulnerabilities

When your WPA2-PSK is compromised, hackers can easily access your network’s Layer 2 (the OSI layer that is used to transfers data between adjacent nodes). Below are just some of the actions a hacker is capable of with Layer 2 access:
  • Address Resolution Protocol (ARP) Attacks
  • Content Addressable Memory (CAM) Table Overflows
  • Spanning Tree Protocol (STP) Attacks
  • Media Access Control (MAC) Spoofing
  • Switch Spoofing
  • Double Tagging
  • Cisco Discovery Protocol (CDP) Reconnaissance
  • Dynamic Host Configuration Protocol (DHCP) Spoofing
WPA2-PSK can be configured to use a password of up to 63 characters, which should be secure enough for any organization to adopt. However, it turns out that is not the case. The reason has to do with the management of WPA2-PSKs.

Comments