Hackers cracking WPA/WPA2 router passwords in new way

spinonews WPA/WPA2 router

New Wi-Fi hacking technique

A cyber-security researcher identified a new Wi-Fi hacking technique that allows hackers to crack Wi-Fi passwords more easily in latest WPA/WPA2 router. The new strategy discovered by Jens Atom Steube, a famous password cracking researcher and developer of cracking tool Hashcat.

Wi-Fi Protected Access (WPA) is a network security technology that provides the security to most Wi-Fi networks. The new technique is discovered to reclaim the Pairwise Master Key Identifier (PMKID) from a WPA/WPA2 routers that can used to crack the passwords. The explosion of this attack mainly effects on 802.11i/p/q/r router networks.

While, in previous WPA/WPA2 cracking methods attacker is wait until the user login to a Wi-Fi and then takes full authentication handshake. While, the new method can extract the RSN IE (Robust Security Network Information Element) from a single EAPOL frame.

Steals Pre-Shared Key

However, the RSN IE contains the PMKID generated by a WPA/WPA2 router to confirm that both the router and client such as Pre-Shared Key (PSK), also calls the Wi-Fi password, on the network.

Source: Hashcat

In the new technique, the WPA/WPA2 router information translated in hexadecimal coded strings, means no special translation or output formats not require. If a router compromised through the new technique, cyber-attacks may steal pre-shared login passwords and perform Man-in-The-Middle (MiTM) attacks.

According to Steube, this is an accidental discovery when he is searching for new ways to attack the latest wireless security protocol WPA3. The WPA3 is harder to attack because it has Simultaneous Authentication of Equals (SAE), a modern key establishment protocol.

To protect the WPA/WPA2 router from hackers, user first should create their own password instead of router generated password. Also give a strengthen password to PSK key password like combination of numbers, lower and upper-case letters and symbols.