Description
I read http://mobile.slashdot.org/story/15/10/20/1618209/tattling-kettles-help-researchers-crack-wifi-networks-in-london https://www.pentestpartners.com/blog/hacking-kettles-extracting-plain-text-wpa-psks-yes-really/
....
The brief version:
De-auth kettle from its usual access point. Use aireplay-ng
Create fake AP with same SSID
Kettle joins
Connect to telnet service, authenticate using default PIN of ‘000000’
Enter ‘AT-KEY’
Plaintext WPA PSK is then disclosed
Yes, it’s that easy
....
So, I changed my AP's setting from WPA2/AES to OPEN(security disabled) with same SSID.
Then my esp8266 connected to the AP without problem.
(configured with WiFi.begin(ssid, password);)
How to get the encryption type of the current connected network ?
Ref: https://www.arduino.cc/en/Reference/WiFiEncryptionType
Want to back this issue? Post a bounty on it! We accept bounties via Bountysource.