Posted on November 18, 2025

Written by Brian Tant
Raxis Chief Penetration Testing Officer Brian Tant is back with a sequel to his 2020 video about wireless network encryption. WPA3 encryption has been out for a few years, and many organizations have updated their systems.
While WPA3 offers greatly enhanced security in comparison to WPA2 encryption, in his new video, Brian discusses the most common vulnerabilities.
- Transition Mode, often a default, allows the use of WPA2. While this is great for older devices and systems that are expensive to upgrade, it also means that all the old WPA2 vulnerabilities are still in play.
- Side-channel attacks, such as Dragonblood attacks, focus on WPA3 itself. While these attacks still require technical know-how to perform, it’s only a matter of time before easier scripts and tools are available.
Whether your organization is still using WPA2, transitioning to WPA3, or fully converted to WPA3, annual wireless network penetration testing is an important part of every security program, finding faulty configurations and default settings your team may not even know about.

Brian Tant
Brian brings to Raxis a rich and varied background in Information Technology spanning more than 20 years. Sought after by clients for his unique blend of business acumen and technical prowess, Brian has consistently delivered value to hundreds of organizations spanning the globe throughout his career. Brian is the Chief Penetration Testing Officer for Raxis and currently leads the Raxis Penetration Testing and Social Engineering team.
Search The Exploit Blog
Blog Categories
- AI
- Careers
- Choosing a Penetration Testing Company
- Exploits
- How To
- In The News
- Injection Attacks
- Just For Fun
- Meet Our Team
- Mobile Apps
- Networks
- Password Cracking
- Patching
- Penetration Testing
- Phishing
- PTaaS
- Raxis In The Community
- Red Team
- Security Recommendations
- Social Engineering
- Tips For Everyone
- Web Apps
- What People Are Saying
- Wireless