#Wpa2 hash algorithm full
The main difference from existing attacks is that in this attack, capture of a full EAPOL 4-way handshake is not required. WPA3 will be much harder to attack because of its modern key establishment protocol called "Simultaneous Authentication of Equals" (SAE). This attack was discovered accidentally while looking for new ways to attack the new WPA3 security standard.
![wpa2 hash algorithm wpa2 hash algorithm](https://cdn.ttgtmedia.com/rms/onlineimages/networking-wireless_security_cheat_sheet-f_mobile.png)
In order to make use of this new attack you need the following tools:
![wpa2 hash algorithm wpa2 hash algorithm](https://www.researchgate.net/profile/Mahmoud-Khasawneh/publication/290743584/figure/fig1/AS:512470868598784@1499193984093/Flow-of-TKIP-Processing-4_Q320.jpg)
![wpa2 hash algorithm wpa2 hash algorithm](https://cylab.be/storage/blog/32/files/fV2Pykhb3wbvhbRpwWvGB1okQG63J9YRmSUf8aX7.jpeg)
In this writeup, I'll describe a new technique to crack WPA PSK (Pre-Shared Key) passwords.