Wireless Encryption: WPA3 and the Gotchas Every Company Should Know About
Raxis Chief Penetration Testing Officer Brian Tant is back with a sequel to his 2020 video about wireless network encryption. WPA3 encryption has been out for a few years, and many organizations have updated their systems.
While WPA3 offers greatly enhanced security in comparison to WPA2 encryption, in his new video, Brian discusses the most common vulnerabilities.
- Transition Mode, often a default, allows the use of WPA2. While this is great for older devices and systems that are expensive to upgrade, it also means that all the old WPA2 vulnerabilities are still in play.
- Side-channel attacks, such as Dragonblood attacks, focus on WPA3 itself. While these attacks still require technical know-how to perform, it’s only a matter of time before easier scripts and tools are available.
Whether your organization is still using WPA2, transitioning to WPA3, or fully converted to WPA3, annual wireless network penetration testing is an important part of every security program, finding faulty configurations and default settings your team may not even know about.