WPA uses AES-CCMP encryption, which remains secure when properly implemented. The -way handshake establishes session keys without transmitting the actual password. Each client gets unique encryption keys. WPA has one weakness: the handshake can be captured and subjected to offline dictionary attacks. If you use a weak password, attackers can crack it by testing millions of guesses per second against the captured handshake.
##### ###### ##### ### # # ### # # ###### ## ## ## ## ## ## ## # # # # # ## ##### #### ##### # # # # # # # #### ## # ## ## ## ## # # # # # ## ## # ###### ## ### # ### # ######
$ curl repovive.com/roadmaps/network-design/wireless-networking/wpa2-security
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░█████████████████████████████████████████████████████████████████████████████