From the course: Ethical Hacking: Wireless Networks

Unlock the full course today

Join today to access over 24,400 courses taught by industry experts.

Understanding the Wi-Fi Protected Setup (WPS)

Understanding the Wi-Fi Protected Setup (WPS) - Linux Tutorial

From the course: Ethical Hacking: Wireless Networks

Understanding the Wi-Fi Protected Setup (WPS)

- [Narrator] The WiFi Alliance has defined a guideline for the WiFi Simple Configuration or WSC protocol. And manufactories can submit their devices to be certified to use the term WiFi Protected Setup, WPS. So to be correct, WPS is the feature and WSC is the protocol. Many modern wireless routers include the WPS feature to provide user-friendly method of connecting to a home network at the press of a button. To connect a device to a secure home network requires knowledge of its SSID. And without WPS, also requires knowledge of its WPA password. To connect, you select wireless networks in the device setup and then pick the network to connect to by SSID. There'll likely be many networks visible. And then enter its security key. WPS simplifies the connection process. Connecting using a WPS certified device involves selecting the network. When asked for the network key, the user presses the WPS button on the router.…

Contents