Wi-Fi Security: WPA3, Evil Twin Attacks, and How to Protect Wireless Networks

Wireless networks are uniquely vulnerable because their signals extend beyond physical boundaries. An attacker in your parking lot can attack your Wi-Fi without ever setting foot inside your building. This guide covers the real Wi-Fi threats and practical defenses — from home networks to enterprise wireless deployments.

Wi-Fi Encryption Standards: The Complete Picture

# Wi-Fi encryption history and status:
WEP (1997)   — Broken in 2001. Never use. Crackable in minutes.
WPA (2003)   — Deprecated. Vulnerable to TKIP attacks.
WPA2-TKIP    — Weak. Avoid TKIP mode.
WPA2-AES     — Acceptable. Still the standard for most deployments.
WPA3-SAE     — Current best. Replaces PSK with Simultaneous Authentication of Equals.
WPA3-Enterprise — 192-bit security for high-security environments.

# Check your router's encryption:
# Router admin panel > Wireless > Security settings
# Should show WPA2-AES or WPA3

Evil Twin Attack: The Most Dangerous Wi-Fi Threat

# Evil Twin setup:
# 1. Attacker identifies target network: "CoffeeShop_WiFi"
# 2. Attacker creates rogue AP with same SSID
# 3. Attacker uses higher transmit power to overpower legitimate AP
# 4. Victims connect to evil twin thinking it is legitimate
# 5. All traffic flows through attacker (full MITM)

# Tools attackers use (for educational awareness):
# Airbase-ng, hostapd-wpe, Fluxion, Wifiphisher

# Detection signs:
# - Captive portal you do not remember from before
# - Certificate warnings when connecting to HTTPS sites
# - Unusually slow connection
# - Disconnect and reconnect loop

# Defense:
# 1. Always use a VPN on public Wi-Fi
# 2. Verify certificate fingerprints for critical sites
# 3. Use HSTS preloaded sites (cannot be MITMed even with evil twin)
# 4. Enterprises: deploy 802.1X (RADIUS) authentication
#    Devices must present certificates — rogue APs cannot issue these

WPA2 Handshake Capture and Offline Cracking

# WPA2 is vulnerable to offline dictionary attacks:
# 1. Attacker captures 4-way handshake (triggered by deauth packet)
# 2. Handshake is extracted from pcap
# 3. Dictionary attack performed offline

# Check your Wi-Fi password strength:
# aircrack-ng can test against rockyou.txt in seconds if password is weak

# How long to crack with Hashcat (RTX 4090):
# 8 chars lowercase: ~3 minutes
# 8 chars + uppercase + numbers: ~3 hours
# 12 chars + all characters: ~50 years
# Passphrase "correct horse battery staple": hundreds of years

# Defense:
# 1. Use WPA3 (SAE mode - not vulnerable to offline dictionary attacks)
# 2. If WPA2: use a password of 20+ random characters
# 3. Or use a diceware passphrase of 6+ words

Enterprise Wi-Fi Security with 802.1X

# 802.1X = Port-based access control using RADIUS authentication
# Devices must authenticate with certificates (EAP-TLS)
# or credentials via EAP-PEAP

# Setup with FreeRADIUS (open source):
sudo apt install freeradius

# Configure EAP-TLS (certificate-based, most secure):
# /etc/freeradius/3.0/mods-enabled/eap
eap {
  default_eap_type = tls
  tls {
    private_key_file = /etc/ssl/private/radius.key
    certificate_file = /etc/ssl/certs/radius.pem
    ca_file = /etc/ssl/certs/ca.pem
  }
}

# Client device requirements:
# Install company CA certificate
# Install user/device certificate
# Configure Wi-Fi profile to use EAP-TLS

Wireless Security Monitoring

# Detect rogue access points on your network:
# Kismet (passive wireless monitoring):
sudo apt install kismet
sudo kismet -c wlan0

# Kismet features:
# - Detects all Wi-Fi networks in range
# - Alerts on new/unexpected APs with your SSID
# - Logs all wireless traffic for forensics
# - Can run on Raspberry Pi as permanent sensor

# For enterprises:
# Cisco WLC or Aruba Mobility Controller have built-in rogue AP detection
# Alert when unauthorized AP appears using your corporate SSID

# Check for clients on wrong band:
# Clients on 2.4GHz (older, weaker) vs 5GHz (faster, shorter range)
iwconfig wlan0 | grep Frequency

Wi-Fi Security Checklist

  • Use WPA3 or WPA2-AES (not WEP, WPA, or TKIP)
  • Wi-Fi password: minimum 20 characters or diceware passphrase
  • Guest network separate from production network
  • IoT devices on isolated VLAN
  • Enterprise: 802.1X with EAP-TLS certificate auth
  • Rogue AP detection deployed
  • VPN required for public Wi-Fi
  • Management interface not accessible over Wi-Fi

Wrap Up

Wi-Fi security is often treated as an afterthought but represents a significant physical perimeter bypass. Use WPA3, enforce strong passphrases, deploy 802.1X for enterprise environments, and monitor for rogue APs. A single evil twin attack on a corporate network can compromise credentials for every employee who connects.