Skip to content

Wireless Network Security — WPA3, Evil Twin, and Wi-Fi Hacking Techniques

What Is Wireless Security and Why Does It Matter?

Section titled “What Is Wireless Security and Why Does It Matter?”

Wireless security is the practice of protecting Wi-Fi networks and wireless communications from unauthorised access, eavesdropping, and attacks. Every organisation and home network relies on wireless connectivity, and the invisible nature of radio signals means attackers do not need physical access to your network — they just need to be within range.

Unlike wired networks where an attacker must physically plug in, wireless signals travel through walls, car parks, and neighbouring buildings. This makes wireless networks uniquely vulnerable. Understanding how wireless protocols work — and how they can be exploited — is essential knowledge for anyone entering cybersecurity.

I remember setting up my first home lab access point for wireless security testing and being amazed at how many neighbouring Wi-Fi networks I could see from my living room. Some were still using WPA2 with weak passwords, and a few even had WPS enabled. It was an eye-opening moment — the attack surface is literally in the air around us. When I started studying the WPA2 four-way handshake, I kept getting lost in the terminology. Then I thought of it like a secret handshake between two friends: both sides prove they know the password without actually saying it out loud. That mental model made the whole process click.

Certification objectives: CompTIA Security+ SY0-701 covers wireless security protocols, wireless attack types, and wireless hardening. CEH v13 includes a dedicated module on wireless hacking covering cracking WEP/WPA/WPA2, rogue access points, evil twin attacks, and wireless security tools.

What Do Real-World Wireless Attacks Look Like?

Section titled “What Do Real-World Wireless Attacks Look Like?”

According to MITRE ATT&CK (techniques T1557 and T1071), wireless networks are a common vector for adversary-in-the-middle attacks and command-and-control communication. Wireless networks introduce unique security challenges that do not exist in wired environments.

ProblemWhat goes wrongReal-world impact
Signals travel beyond physical boundariesRadio waves extend past walls, fences, and property linesAttackers can intercept traffic or attempt access from car parks, lobbies, or neighbouring buildings
Legacy encryption protocolsWEP can be cracked in minutes; WPA with TKIP has known weaknessesOrganisations still running outdated protocols have effectively no wireless security
Weak pre-shared keysShort or common Wi-Fi passwords can be cracked via dictionary attacksAn attacker captures the handshake and cracks the password offline with no detection
Rogue access pointsUnauthorised APs connected to the corporate network bypass security controlsEmployees plugging in personal routers create backdoors past firewalls and monitoring
Evil twin attacksFake APs impersonate legitimate networks to intercept trafficUsers unknowingly connect to the attacker’s network and expose credentials
Default configurationsWPS enabled, default admin passwords, SSID broadcasting sensitive namesAttackers exploit known defaults to gain access without sophisticated techniques

Every cybersecurity professional needs to understand these risks, whether you are securing a corporate environment, advising small businesses, or simply protecting your own home network.

The IEEE 802.11 standard defines the protocols governing wireless local area networks, while NIST SP 800-153 provides guidelines for securing wireless networks in enterprise environments. Think of a wireless network like a conversation in a public park. A wired network is a private phone call — only the two connected parties can hear. A wireless network is two people talking in an open space — anyone within earshot can listen.

Wireless security is about making that conversation unintelligible to eavesdroppers (encryption), verifying that you are talking to the right person (authentication), and detecting when someone is trying to disrupt or impersonate (monitoring).

The IEEE 802.11 family defines wireless networking standards. Each generation improved speed, range, and security:

StandardCommon nameMax speedFrequencyYearSecurity note
802.11bWi-Fi 111 Mbps2.4 GHz1999WEP era — completely insecure
802.11aWi-Fi 254 Mbps5 GHz1999Same WEP issues
802.11gWi-Fi 354 Mbps2.4 GHz2003WPA introduced during this era
802.11nWi-Fi 4600 Mbps2.4/5 GHz2009WPA2 became mandatory
802.11acWi-Fi 56.9 Gbps5 GHz2013WPA2 standard, WPA3 optional
802.11axWi-Fi 6/6E9.6 Gbps2.4/5/6 GHz2020WPA3 recommended, SAE replaces PSK

Understanding the evolution from WEP to WPA3 is critical — it appears on nearly every cybersecurity certification exam.

ProtocolEncryptionAuthenticationStatusKey weakness
WEPRC4 stream cipherShared key (static)Broken — never useStatic initialisation vectors (IVs); crackable in minutes with aircrack-ng
WPATKIP (RC4 with improvements)PSK or 802.1XDeprecatedTKIP has known vulnerabilities; temporary fix for WEP
WPA2 PersonalAES-CCMPPre-Shared Key (PSK)Current minimumVulnerable to offline dictionary attacks if the handshake is captured
WPA2 EnterpriseAES-CCMP802.1X/RADIUSRecommendedRequires RADIUS infrastructure; complex to deploy
WPA3 PersonalAES-GCMPSAE (Simultaneous Authentication of Equals)Best availableSAE resists offline dictionary attacks; forward secrecy
WPA3 EnterpriseAES-256-GCMP802.1X with 192-bit suiteBest for organisationsRequires compatible hardware and infrastructure

Why WPA3 matters: WPA3’s SAE (Simultaneous Authentication of Equals) replaces the PSK four-way handshake with a zero-knowledge proof. This means even if an attacker captures the authentication exchange, they cannot perform offline dictionary attacks — a fundamental improvement over WPA2.

Step-by-Step: How the WPA2 Four-Way Handshake Works

Section titled “Step-by-Step: How the WPA2 Four-Way Handshake Works”

The WPA2 four-way handshake is the authentication process between a client (your device) and an access point. Understanding this process is essential because it is the exact mechanism attackers target.

Step 1 — ANonce: The access point (AP) generates a random number called ANonce and sends it to the client. This is unencrypted.

Step 2 — SNonce + MIC: The client generates its own random number (SNonce), then uses the ANonce, SNonce, its MAC address, the AP’s MAC address, and the pre-shared key (PSK) to derive the Pairwise Transient Key (PTK). The client sends the SNonce back to the AP along with a Message Integrity Check (MIC) to prove it knows the PSK.

Step 3 — GTK + MIC: The AP performs the same PTK derivation and verifies the client’s MIC. If valid, the AP sends the Group Temporal Key (GTK — used for broadcast traffic) encrypted with the PTK, along with its own MIC.

Step 4 — Acknowledgement: The client confirms the keys are installed and the handshake is complete. All subsequent traffic is encrypted with the derived keys.

Why this matters for attackers: If an attacker captures this four-way handshake (by deauthenticating a client and waiting for reconnection), they have all the information needed to attempt an offline dictionary attack against the PSK. They test millions of potential passwords against the captured handshake until one produces a matching MIC.

Key insight: The WPA2 handshake does not reveal the password directly. The attacker must already have a candidate password and test it against the captured handshake. This is why long, complex passwords make WPA2 cracking impractical.

How Does Wireless Security Fit Into a Security Architecture?

Section titled “How Does Wireless Security Fit Into a Security Architecture?”

WPA2 Handshake Capture and Crack

How attackers capture and crack WPA2 pre-shared keys

Monitor ModePassive listening
Enable monitor mode on wireless adapter
Identify target network (BSSID, channel)
DeauthenticationForce reconnection
Send deauth frames to target client
Client disconnects from AP
Handshake CaptureTraffic interception
Client reconnects automatically
Capture four-way handshake in pcap file
Offline CrackingDictionary attack
Test candidate passwords against handshake
GPU-accelerated with hashcat or aircrack-ng
ResultSuccess or failure
Weak PSK cracked in minutes to hours
Strong PSK remains unbroken
Idle

WPA2 Personal vs WPA2 Enterprise

WPA2 Personal (PSK)
  • Shared passwordEveryone uses the same pre-shared key to connect
  • Simple to set upJust configure a password on the AP and share it
  • No individual accountabilityCannot identify which user generated specific traffic
  • Vulnerable to offline crackingCaptured handshake can be brute-forced against dictionaries
  • Best for home useSuitable for homes and very small offices with trusted users
VS
WPA2 Enterprise (802.1X)
  • Individual credentialsEach user authenticates with unique username and password via RADIUS
  • Complex to deployRequires RADIUS server, certificates, and PKI infrastructure
  • Full accountabilityEvery connection is logged to a specific user identity
  • Resistant to offline attacksNo shared key to capture; per-session encryption keys
  • Required for organisationsEssential for corporate environments and regulatory compliance
Verdict: Home networks can use WPA2/WPA3 Personal with a strong, unique passphrase. Any organisation with more than a handful of users should implement WPA2/WPA3 Enterprise with 802.1X authentication.
Use case
Enterprise mode eliminates the shared password problem and provides individual user accountability — critical for compliance and incident response.

Understanding these attack categories is essential for both offensive and defensive wireless security:

AttackHow it worksToolsDefence
Evil twinAttacker creates a fake AP with the same SSID as the legitimate networkWiFi Pineapple, hostapd802.1X authentication, WIDS, user awareness training
DeauthenticationFlood deauth frames to disconnect clients from the legitimate APaireplay-ng, mdk3802.11w (Protected Management Frames), WPA3
Rogue access pointUnauthorised AP connected to the corporate networkAny consumer routerNetwork access control (NAC), WIDS/WIPS, port security
KARMA attackResponds to any probe request, tricking devices into connectingWiFi PineappleDisable auto-connect, remove saved networks, use VPN
WPS PIN attackBrute-force the 8-digit WPS PIN (only 11,000 combinations due to design flaw)Reaver, BullyDisable WPS completely on all access points
KRACKKey Reinstallation Attack exploiting WPA2 handshake vulnerability (CVE-2017-16)krackattacks toolsPatch all clients and APs; WPA3 is not vulnerable
WardrivingScanning for wireless networks while moving through an areaKismet, WigleNot directly preventable — defence is strong encryption and authentication

What Does Wireless Security Look Like in Practice?

Section titled “What Does Wireless Security Look Like in Practice?”

NIST SP 800-153 recommends regular wireless security assessments as part of an organisation’s information security programme. The following examples demonstrate common tools and commands used in legitimate wireless security testing.

Legal warning: Wireless testing without explicit written authorisation is illegal under the Telecommunications (Interception and Access) Act 1979 (Cth) and the Criminal Code Act 1995 (Cth) in Australia. Only practise on networks you own or have written permission to test.

Example 1: Wireless Reconnaissance with aircrack-ng

Section titled “Example 1: Wireless Reconnaissance with aircrack-ng”
Terminal window
# Put your wireless adapter into monitor mode
sudo airmon-ng start wlan0
# Scan for all nearby wireless networks
sudo airodump-ng wlan0mon
# Output shows: BSSID, channel, encryption type, SSID, connected clients
# Look for: WEP networks (immediately vulnerable), WPA2 with WPS enabled
# Target a specific network and capture handshake
sudo airodump-ng -c 6 --bssid AA:BB:CC:DD:EE:FF -w capture wlan0mon
# -c 6 = channel 6
# --bssid = target access point MAC
# -w capture = write to file called 'capture'

Example 2: Capturing and Cracking a WPA2 Handshake

Section titled “Example 2: Capturing and Cracking a WPA2 Handshake”
Terminal window
# Step 1: While airodump-ng is running, deauth a connected client
# (in a separate terminal)
sudo aireplay-ng -0 1 -a AA:BB:CC:DD:EE:FF -c 11:22:33:44:55:66 wlan0mon
# -0 1 = send 1 deauthentication frame
# -a = target AP BSSID
# -c = target client MAC
# airodump-ng will show "WPA handshake: AA:BB:CC:DD:EE:FF" when captured
# Step 2: Crack the handshake with a wordlist
aircrack-ng -w /usr/share/wordlists/rockyou.txt capture-01.cap
# If the PSK is in the wordlist, aircrack-ng will find it
# Step 3: For faster cracking, use hashcat with GPU acceleration
# Convert cap to hccapx format first
hashcat -m 22000 capture.hc22000 /usr/share/wordlists/rockyou.txt

Example 3: Detecting Rogue Access Points with Kismet

Section titled “Example 3: Detecting Rogue Access Points with Kismet”
Terminal window
# Install and start Kismet (wireless network detector and sniffer)
sudo kismet
# Kismet provides a web interface at http://localhost:2501
# It passively monitors all wireless traffic and identifies:
# - All access points and their encryption types
# - Connected clients and their behaviour
# - Rogue APs (unknown BSSIDs broadcasting known SSIDs)
# - Devices probing for networks (potential attack targets)
# Export data for analysis
kismet_log_to_pcap --in Kismet-log.kismet --out analysis.pcap

Example 4: Checking Your Own Network Security

Section titled “Example 4: Checking Your Own Network Security”
Terminal window
# Check if WPS is enabled on your router (common vulnerability)
wash -i wlan0mon
# If your network appears, WPS is enabled — disable it immediately
# Check your Wi-Fi password strength
# A strong WPA2/WPA3 passphrase should be:
# - At least 14 characters (20+ recommended)
# - Not a dictionary word or common phrase
# - Include mixed case, numbers, and special characters
# - Not based on personal information
# Verify your router firmware is up to date
# Log into your router's admin interface (usually 192.168.1.1 or 192.168.0.1)
# Check: Administration > Firmware Update

What Are the Limitations of Wireless Security?

Section titled “What Are the Limitations of Wireless Security?”

According to the Wi-Fi Alliance, even WPA3 has known implementation vulnerabilities (such as Dragonblood side-channel attacks), demonstrating that no protocol is immune to all attack vectors. Wireless security requires balancing convenience with protection. Every organisation makes trade-offs.

StrengthCommon failure modeBetter approach
WPA3 prevents offline dictionary attacksOrganisation deploys WPA3 but keeps WPA2 as fallback for legacy devicesCreate a separate, isolated VLAN for legacy WPA2 devices with restricted access
802.1X provides individual user authenticationCertificate deployment is complex, so IT uses PEAP with weak passwordsInvest in proper PKI and enforce strong credentials via RADIUS policies
MAC address filtering restricts connectionsMAC addresses are trivially spoofed with a single commandMAC filtering provides no real security — rely on encryption and authentication
Hidden SSIDs reduce visibilityClients probe for hidden networks, making them easier to detectBroadcast the SSID normally and protect with strong WPA2/WPA3 Enterprise
WIDS/WIPS detects rogue access pointsSystem generates excessive false positives, so alerts are ignoredTune detection rules and establish a clear investigation workflow

The fundamental lesson: Wireless security depends on strong encryption (WPA3 or WPA2-AES), strong authentication (802.1X for organisations, long passphrases for personal use), and continuous monitoring (WIDS/WIPS). No single control is sufficient on its own.

What Interview Questions Should You Expect About Wireless Security?

Section titled “What Interview Questions Should You Expect About Wireless Security?”

Wireless security questions appear frequently in cybersecurity interviews, particularly for roles involving network security or SOC operations.

QuestionWhat they are testingStrong answer approach
What is the difference between WEP, WPA, WPA2, and WPA3?Knowledge of wireless encryption evolutionWEP is broken (static RC4), WPA was a temporary fix (TKIP), WPA2 uses AES and is the current minimum, WPA3 adds SAE to prevent offline dictionary attacks
How does an evil twin attack work?Understanding of wireless threat landscapeAttacker creates a fake AP with the same SSID as the target. Users connect to the fake AP and the attacker intercepts their traffic. Defence includes 802.1X and user awareness
Why should WPS be disabled?Practical security awarenessWPS uses an 8-digit PIN with a design flaw that reduces the keyspace to approximately 11,000 combinations, making it brute-forceable in hours regardless of the WPA2 password strength
What is the difference between WPA2 Personal and Enterprise?Understanding of authentication modelsPersonal uses a shared pre-shared key for everyone. Enterprise uses 802.1X with RADIUS for individual credentials. Enterprise provides accountability and eliminates shared password risks
How would you secure a corporate wireless network?Ability to apply concepts practicallyWPA3 Enterprise with 802.1X/RADIUS, strong certificate-based authentication, network segmentation (guest vs corporate), WIDS/WIPS, disable WPS, regular security assessments

How Is Wireless Security Used in Real Security Operations?

Section titled “How Is Wireless Security Used in Real Security Operations?”

Wireless security is a significant concern in Australian organisations, particularly given the density of wireless networks in urban business districts.

SOC perspective: Security Operations Centres monitor wireless environments using Wireless Intrusion Detection Systems (WIDS) and correlate wireless events with SIEM data. SOC analysts investigate alerts for rogue access points, deauthentication attacks, and unauthorised client connections. Understanding wireless attack patterns helps analysts distinguish between legitimate connectivity issues and active attacks.

ASD Essential Eight: While the Essential Eight does not have a wireless-specific control, several mitigations apply directly — application hardening (disabling unnecessary wireless features like WPS), patching (keeping access point firmware current), and restricting administrative privileges (limiting who can modify wireless configurations). The ACSC ISM includes detailed wireless security controls for Australian Government systems, including requirements for WPA2 Enterprise minimum, wireless segmentation, and WIDS deployment.

ACSC guidance: The Australian Cyber Security Centre recommends organisations implement WPA2 Enterprise (or WPA3 where supported), disable WPS on all access points, segment wireless networks from sensitive internal networks, and deploy wireless intrusion detection. Their small business guidance emphasises strong WPA2/WPA3 passphrases and regular router firmware updates.

Australian regulatory context: Organisations handling sensitive government data must comply with the ISM’s wireless security controls. Healthcare organisations under the My Health Records Act and financial institutions regulated by APRA CPS 234 are expected to implement appropriate wireless security as part of their overall information security posture.

Practical advice for Australian job seekers: Wireless security skills are valued across SOC analyst, network security, and penetration testing roles. Demonstrate knowledge of wireless encryption protocols, common attack techniques, and practical hardening measures. Reference the ASD ISM wireless controls when discussing how wireless security fits into organisational security architecture.

Wireless security is a critical domain because radio signals extend beyond physical boundaries — attackers do not need to be inside your building to attack your network.

  • WEP is completely broken and should never be used. WPA with TKIP is deprecated. WPA2 with AES is the current minimum. WPA3 with SAE is the recommended standard.
  • The WPA2 four-way handshake is the primary target for wireless attacks. If an attacker captures it, they can attempt offline dictionary attacks against the pre-shared key.
  • Strong passphrases defeat cracking. A 20+ character random passphrase makes WPA2 cracking computationally impractical, even with GPU acceleration.
  • WPA2 Enterprise with 802.1X eliminates the shared password problem and provides individual user accountability — essential for any organisation.
  • Evil twin and deauthentication attacks exploit the trust model of wireless networks. 802.11w Protected Management Frames and WPA3 mitigate deauth attacks.
  • Always disable WPS. The design flaw in WPS PIN authentication makes it brute-forceable regardless of password strength.
  • Never test wireless networks without permission. Wireless interception and unauthorised access are criminal offences in Australia.

Frequently Asked Questions

What is the most secure Wi-Fi encryption available?

WPA3 Enterprise with AES-256-GCMP and 192-bit security suite is the most secure option for organisations. For home use, WPA3 Personal with SAE provides the best available protection. WPA3's SAE protocol prevents offline dictionary attacks, which is the primary weakness of WPA2 Personal.

Can WPA2 be cracked?

WPA2 Personal can be cracked if an attacker captures the four-way handshake and the pre-shared key is weak enough to be found via dictionary attack. A strong, random passphrase of 20 or more characters makes this impractical. WPA2 Enterprise is resistant to this attack because it does not use a shared key.

What is an evil twin attack?

An evil twin attack involves creating a fake access point that impersonates a legitimate Wi-Fi network by using the same SSID. When users connect to the fake AP, the attacker can intercept all their traffic, capture credentials, and perform man-in-the-middle attacks. Defence includes 802.1X authentication and user awareness training.

Why should I disable WPS?

Wi-Fi Protected Setup uses an 8-digit PIN with a design flaw that allows the PIN to be attacked in two halves, reducing the keyspace to approximately 11,000 combinations. Tools like Reaver can brute-force this in hours, completely bypassing your WPA2 password regardless of its strength. Always disable WPS on all access points.

What is the difference between WPA2 Personal and Enterprise?

WPA2 Personal uses a single pre-shared key (password) shared by all users. WPA2 Enterprise uses 802.1X authentication with a RADIUS server, giving each user unique credentials. Enterprise mode provides individual accountability, eliminates the shared password risk, and generates unique encryption keys per session.

What is a deauthentication attack?

A deauthentication attack sends forged management frames to disconnect a client from its access point. This is used to force clients to reconnect (allowing handshake capture) or as a denial-of-service attack. WPA3 and 802.11w Protected Management Frames (PMF) protect against this by authenticating management frames.

Is it legal to test wireless networks in Australia?

Testing wireless networks without explicit written authorisation is illegal under the Telecommunications (Interception and Access) Act 1979 and the Criminal Code Act 1995 in Australia. Always obtain written permission before testing. For practice, set up your own isolated lab network with a dedicated access point.

What tools are used for wireless security testing?

The aircrack-ng suite is the primary toolset (airmon-ng, airodump-ng, aireplay-ng, aircrack-ng). Kismet is used for wireless detection and monitoring. Hashcat provides GPU-accelerated password cracking. Wireshark analyses captured wireless traffic. These are all included in Kali Linux.

Does MAC address filtering improve wireless security?

MAC address filtering provides minimal security because MAC addresses can be trivially spoofed. An attacker can observe legitimate MAC addresses with airodump-ng and clone them in seconds. MAC filtering should not be relied upon as a security control — use strong encryption and authentication instead.

Is wireless security covered in Security+ and CEH?

Yes. CompTIA Security+ SY0-701 covers wireless encryption protocols, wireless attack types, and wireless hardening best practices. CEH v13 includes a dedicated module on wireless hacking with hands-on coverage of WEP/WPA cracking, evil twin attacks, and wireless security tools. Both certifications test this knowledge extensively.


Technical concepts verified in March 2026 against the IEEE 802.11 standards, Wi-Fi Alliance WPA3 specification, aircrack-ng documentation, and the ACSC Information Security Manual (ISM). Wireless security protocols and tool capabilities should be verified against current sources as standards and attack techniques continue to evolve.