" Wireless network technologies and protocols are rapidly developing and already offer mind-blowing speeds measured in gigabits! But from the perspective of wireless network security audit, something else is more interesting: is it possible to hack modern Wi-Fi protocols?
This article will show practical examples of current methods for auditing the security (penetration testing) of modern Wi-Fi protocols.
The short answer to this question is: yes, everything is about the same as before – in fact, nothing has changed.
What exactly has been tested and works:
Another nuance is the widespread (in some countries) use of 5 GHz frequencies – this does not prevent hacking of the Wi-Fi password, it just means the need to work with these frequencies as well. "
Source: https://miloserdov.org/?p=8322
Note: The article makes no mention of the Simultaneous Authentication of Equals (SAE) handshake protocol—based on the Dragonfly key exchange—used in WPA3.
An attack on the handshake of a SAE AP is not supported by John or hashcat. But the CLIENT can be forced to connect to hcxdumptool or better hcxlabtool.
In this case, it is downgraded to WPA2 and you get an EAPOL M1M2ROGUE from the CLIENT on which hashcat or JtR can work.
This article will show practical examples of current methods for auditing the security (penetration testing) of modern Wi-Fi protocols.
The short answer to this question is: yes, everything is about the same as before – in fact, nothing has changed.
What exactly has been tested and works:
- Wireless adapters with support for the Wi-Fi 7 (802.11be) protocol can switch to monitor mode, capture data and perform wireless attacks (disassociation of clients, association with AP, etc.)
- Handshake capturing (used to crack passwords) between the Client and the Access Point is possible, at least for Wi-Fi 6 (802.11ax) networks
- WPS attacks (including Pixie Dust) work as before – this technology, apparently, is not developing, but is present in modern Wi-Fi devices
- Hacking passwords on the latest generation of GeForce RTX 50 series video cards works fine
Another nuance is the widespread (in some countries) use of 5 GHz frequencies – this does not prevent hacking of the Wi-Fi password, it just means the need to work with these frequencies as well. "
Source: https://miloserdov.org/?p=8322
Note: The article makes no mention of the Simultaneous Authentication of Equals (SAE) handshake protocol—based on the Dragonfly key exchange—used in WPA3.
An attack on the handshake of a SAE AP is not supported by John or hashcat. But the CLIENT can be forced to connect to hcxdumptool or better hcxlabtool.
In this case, it is downgraded to WPA2 and you get an EAPOL M1M2ROGUE from the CLIENT on which hashcat or JtR can work.