WiFi Security
Analysis Center.
Test your password strength, understand WiFi encryption protocols, and learn how to defend your network against the most common attack vectors.
Password Strength Analyzer
Interactive ToolYour WiFi password is the primary line of defense. A weak PSK can be cracked in minutes using modern GPU-accelerated brute-force attacks. Our entropy-based analyzer evaluates your password against real-world attack scenarios.
We calculate Shannon entropy — a mathematical measure of unpredictability — along with checking for common patterns, dictionary words, and sequential characters.
Password Best Practices
Minimum 16 characters for WiFi passwords.
Mix uppercase, lowercase, numbers, and symbols.
Change your WiFi password every 6 months.
Never use the default router password.
Use a passphrase: "correct horse battery staple" is strong.
Disable WPS — it has known vulnerabilities.
WiFi Encryption Standards Compared
WEP
Wired Equivalent Privacy
WEP uses static RC4 encryption. The FMS attack proved it can be cracked by capturing enough packets. Upgrade immediately.
WPA2
WiFi Protected Access 2
WPA2 uses AES-CCMP with 128-bit keys. The 2017 KRACK vulnerability exposed handshake weaknesses. Still widely used but vulnerable to offline dictionary attacks with weak passwords.
WPA3
WiFi Protected Access 3
WPA3 replaces PSK with SAE (Dragonfly handshake), resisting offline attacks. Includes 192-bit enterprise encryption and mandatory PMF.
Common WiFi Attack Vectors
Man-in-the-Middle (MITM)
Attackers position themselves between your device and router, intercepting traffic. On public WiFi without encryption, this is trivially easy. Always use HTTPS and consider a VPN.
Evil Twin Attack
An attacker creates a rogue AP with the same SSID. Your device may auto-connect to the stronger signal, routing all traffic through the attacker.
Deauthentication Attack
Forged deauth frames disconnect devices, forcing reconnection during which handshakes can be captured. WPA3's PMF mitigates this entirely.
Protecting Your Network
Enable WPA3, use 16+ char passwords, disable WPS, update firmware regularly, change default admin credentials, enable the firewall, and set up a guest network for IoT devices.