Not sure if this has been posted or not, but I recently found out that you can obtain a routers WPA/WPA2 key by brute forcing the WPS pin.
I tried the exploit on a few different routers I had lying around.. they were all cracked except for my Linksys with DD-WRT. The others were a D-link 615 , same Linksys WRT54G WITHOUT DD-WRT and an Actiontec V1000H.
I would say 8 out of 10 routers were vulnerable , according to the scanner that comes with the exploit. Each crack took anywhere from 2 - 7 hours. On a successful crack, I was given the WPS PIN and WEP/WPA/WPA2 key in plain text.
How do you mitigate this attack? Using custom firmware (such as DD-WRT) that allows you to disable WPS seems to do the trick. Other routers do, but it does not seem to really help. Obviously using WPA-Enterprise where a PSK is not used , you would be safe as well.
Read more here.
Yikes!