Date: Wed, 24 Apr 2013 17:11:26 -0400 From: Michael Powell <nightrecon@hotmail.com> To: freebsd-questions@freebsd.org Subject: Re: Home WiFi Router with pfSense or m0n0wall? Message-ID: <kl9hpu$fik$1@ger.gmane.org> References: <CAHieY7S9b9F1jndpkR2Drw=GCoBxmEWRs6Ot8MRjjQFH=xmHQQ@mail.gmail.com> <kl0qu9$ovo$1@ger.gmane.org> <CAHieY7SSbO%2Bwt68PeFLYDzAtqMnR0kJ3UakOjvLkSMzVA31LbA@mail.gmail.com> <kl3vao$hbt$1@ger.gmane.org> <20130423010407.25a73c92@gumby.homeunix.com> <CAHieY7SSzuJBt6frT7QoU=EzZDA=9Fc=H-xDHYtH3PejTi5QzQ@mail.gmail.com> <kl9ej0$f2b$1@ger.gmane.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Michael Powell wrote: > [snip] >>> Are you saying that any WPA2 key can be cracked or or you simply >>> referring to weak keys? >> >> I would also like to specifically if it's for weak keys or are all >> WPA2 personal keys crackable by brute force. Also is WPA2 Enterprise >> as weak also. Could anyone expand on how weak is WPA2 and WPA2 >> Enterprise or is this related to weak PSKs only?? >> Oh, and BTW was going to include this in the last and forgot: http://www.aircrack-ng.org/doku.php?id=cracking_wpa -Mike
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?kl9hpu$fik$1>