They also demonstrated that attackers in the middle could initiate a downgrade attack, which forces the network to fall back to WPA2. This allows hackers to capture part of the handshake (a process ...