Many times it require the user to login upgrade to the latest firmware and change many configuration to get a somewhat secure router.
Most users will of course run with the default settings and just run the installation wizard and only care about to get online.
Blackhat Hackers can take advantage of this mindset when performing WPA cracking on the router.
There are several ways Blackhat crackers or hackers can exploit. A common flow is that it is can be somewhat easy to capture a Wifi connection handshake.
So all the wpa cracker software needs to do is bomb the access point router with a heavy or in some cases even a small Denial of Service attack.
At some very weak routers it just takes a few deauthentication packages to disconnect one or all users even.
Attackers can Crackwpa passwords from WiFI Routers using their powerful laptops with WiFi Password Recovery software on it.
Use professional software to crackwpa your own WiFi Encrypted Networks to show vulnerable status. Click here.
The users software will read it as a connection error and simple reconnect again. On connection of course the wpa cracker software will sniff the connection handshake.
With even average low cost quad core CPUs today in most laptops you can get up to 10.000 cracks per second.
Once the WPA cracker software has captured the connection handshake the hacker will run it against popular word lists to brute force it.
Another popular attack vector is a newer offline or online WPS attack if the router has WPS enabled.
The WPA Cracker Software can bypass the strength and security of the WPA or WPA2 Keys.
Simple by brute forcing the PIN code of the vulnerable WPS protection in the matter of a few hours in some cases.
When the PIN Code is identified.
It will also often reveal the real WPA or WPA2 Key in plaintext no matter the size of key or complexity.
It is recommended in most cases to disable WPS Pin Code on the router due to the history of severe vulnerabilities in the technology.