Security Hub

WiFi Security
Analysis Center.

Test your password strength, understand WiFi encryption protocols, and learn how to defend your network against the most common attack vectors.

Password Strength Analyzer

Interactive Tool

Your WiFi password is the primary line of defense. A weak PSK can be cracked in minutes using modern GPU-accelerated brute-force attacks. Our entropy-based analyzer evaluates your password against real-world attack scenarios.

We calculate Shannon entropy — a mathematical measure of unpredictability — along with checking for common patterns, dictionary words, and sequential characters.

Cryptographic Strength
Enter a password

Password Best Practices

Minimum 16 characters for WiFi passwords.

Mix uppercase, lowercase, numbers, and symbols.

Change your WiFi password every 6 months.

Never use the default router password.

Use a passphrase: "correct horse battery staple" is strong.

Disable WPS — it has known vulnerabilities.

WiFi Encryption Standards Compared

WEP

Wired Equivalent Privacy

Deprecated — crackable in 5 min

WEP uses static RC4 encryption. The FMS attack proved it can be cracked by capturing enough packets. Upgrade immediately.

WPA2

WiFi Protected Access 2

Industry standard since 2004

WPA2 uses AES-CCMP with 128-bit keys. The 2017 KRACK vulnerability exposed handshake weaknesses. Still widely used but vulnerable to offline dictionary attacks with weak passwords.

WPA3

WiFi Protected Access 3

Latest standard — recommended

WPA3 replaces PSK with SAE (Dragonfly handshake), resisting offline attacks. Includes 192-bit enterprise encryption and mandatory PMF.

Common WiFi Attack Vectors

Man-in-the-Middle (MITM)

Attackers position themselves between your device and router, intercepting traffic. On public WiFi without encryption, this is trivially easy. Always use HTTPS and consider a VPN.

Evil Twin Attack

An attacker creates a rogue AP with the same SSID. Your device may auto-connect to the stronger signal, routing all traffic through the attacker.

Deauthentication Attack

Forged deauth frames disconnect devices, forcing reconnection during which handshakes can be captured. WPA3's PMF mitigates this entirely.

Protecting Your Network

Enable WPA3, use 16+ char passwords, disable WPS, update firmware regularly, change default admin credentials, enable the firewall, and set up a guest network for IoT devices.