Quote:
Originally Posted by ocabj
WPA was broken in 2009 using a method of short packet spoofing. It targeted a weakness in TKIP which is the underlying algorithm for WPA.
This is why no one uses (or should be using) WPA.
|
Yes, someone shrewd enough and wanting in sniffing WPA running TKIP has an entry point, which is why WPA2 was fast tracked in implementing CCMP-AES crypto.
Also for the OP along side a very hardened PSK (password) if you are presumably using this, if your device supports WPS PINs you need to disable that, even if the device is supporting WPA2.