Whereas, the new attack no longer requires another user to be on the target network to capture credentials. According to the researcher, the previously known WiFi hacking methods require attackers to wait for someone to log into a network and capture a full 4-way authentication handshake of EAPOL, which is a network port authentication protocol.