It actually depends on the key space used in WPA2, whether it will be crackable. WPA2 supports a large "key space", and when a very large password is used to take advantage of WPA2 technology, say the maximum 63 characters, it would be virtually impossible to crack. It would take too long with current technology.
But say you used only a 15 character password under WPA2... You wouldn't be taking advantage of the key space supported under WPA2 so it would be as crackable as any other relatively short password.
Total agree with your WPA2 comments.
But as I said WPS is enabled on most routers and the pin is only 8 numbers( it's the pin usually written on the underside of the router ) and it is now able to be crack even if you have WEP, WPA, WPA2 encryption on your network. It's a brute force attack on the pin. Were as WPA2 is a dictionary attack.
Reaver was release at the end of last year to crack WPS. So unless your router manufacture has released a firmware update to fix the WPS venerability and the router has been flashed then it's still venerable to the attack.
You can run Walsh to chech if your router is venerable to a reaver attack.
Sent from my iPhone using Tapatalk