this post was submitted on 23 Jul 2024
233 points (98.7% liked)
Technology
59495 readers
3081 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
WPA2 is pretty trivial too. Not as easy as WEP since you do have to locally brute-force the PSK (password), but that's pretty quick on modern systems. We had multiple assignments when I was in college that had cracking a WPA2 password as a step (in the interest of time, the instructor used passwords from the RockYou list but still)
Yeah, if you’re using common words or variants thereof, you’re gonna have a bad time. But a 128 character string of random characters is going to be functionally safe from such an attack, for now.
And you'll go crazy every time you try to add a device that doesn't support QR code scanning.
Just use multiple dictionary words with a symbol or two thrown in. Or go all out and set up 802.1x with client certificates and save the PSKs for a firewalled segment of less important crap.
Although it's worth mentioning that wireless security means nothing to jamming. Jamming is RF, it's destroying layer 1 before WPA matters.