In this chapter, we have covered the WPA/WPA2 security protocol and analyzed how to capture the WPA four-way handshake and use it to crack the PSK with the many tools available on Kali Linux.
There is also an attack against Wi-Fi Protected Setup (WPS) deployments that can lead to WPA PSK recovery in a relatively short time. We will cover this and other attacks against access points in Chapter 6, Attacking Access Points and the Infrastructure.