I. Introduction
WPA2 resistance against several threats lasted for about 14 years before discovering some weaknesses and vulnerabilities in most of its implementations[1]. Recent studies practically exploited some discovered vulnerabilities of both WPA2 personal and enterprise implementation modes[2], [3]. However, it's still considered the latest and most secure 4-way handshake protocol for wireless security that comply with 802.11 i version D9:0 [4]. The major security objectives for any wireless protocol are authentication and confidentiality. Authentication ensures that associated clients are really who they claim, while confidentiality focus on secrecy of transmitted data. Brute force and Dictionary attacks are common examples that target authentication by retrieving network access secrets. Man in the middle, replay and key reinstallation attacks target data confidentiality by eavesdropping transmitted data without the need to crack network access secrets. In this paper, we practically launch advanced techniques of common wireless attacks to evaluate current WPA2 security against recent threats. The remainder of this paper is organized as follows. Section II is a background about WPA2 framework and applied defenses. Section III portrays recent wireless threats and attacks. In section IV, we describe the implementation prototype environment and evaluation methodology of WPA2. Finally, conclusions and future directions are discussed in section V.