Why does message 1 of the WPA2 4 way handshake begin with the access point sending a random number?

All the references I have found
https://en.wikipedia.org/wiki/IEEE_802.11i-2004
https://www.wifi-professionals.com/2019/01/4-way-handshake
https://www.hitchhikersguidetolearning.com/2017/09/17/eapol-4-way-handshake/
indicate that the first… Continue reading Why does message 1 of the WPA2 4 way handshake begin with the access point sending a random number?

Wi-Fi station wont connect to AP … WPA2-PSK -Security auth flaw detected [closed]

Security auth flaw detected
Hardware: ELM327 station mode
AP DD-wrt, OpenWRT, n66u Asus, tried several others
Legacy 802.11G
Stations disconnect after a few minutes. Tried to reset the WiFi station board – see below)

OpenWRT AP

Log fro… Continue reading Wi-Fi station wont connect to AP … WPA2-PSK -Security auth flaw detected [closed]

Is there a point in randomizing my WPA2-Personal SSID (meaning, set a random string in place of the SSID)?

I was looking for ways to make Wi-Fi that uses WPA2-Personal/WPA-PSK secure, and I stumbled in this answer (the second one, from Terrence Koeman):

WPA2-PSK (aka WPA2 Personal) basically does the same thing as WPA2-Enterprise from the clie… Continue reading Is there a point in randomizing my WPA2-Personal SSID (meaning, set a random string in place of the SSID)?

Aircrack says KEY NOT FOUND for a password present in the dictionary

I captured the handshake using airodump and tried to crack it. Aircrack didn’t crack the password but the password was correct and was present in the dictionary. The password was 12345678, which when I uploaded on onlinehashcrack immediate… Continue reading Aircrack says KEY NOT FOUND for a password present in the dictionary