The Cisco EPC 2425 routers supplied by UPC are vulnerable to an offline dictionary attack if the handshake is obtained by an attacker.
The WPA pass phrase has the following features:
- A to Z Uppercase only
- 8 characters long
- 208,827,064,576 possible combinations ( AAAAAAAA – ZZZZZZZZ ) 26^8
Due to the recent optimizations in cracking WPA-PSK handshakes with GPU cards, the above range ( AAAAAAAA to ZZZZZZZZ – 26^8 ) can be brute forced within 6 days at a rate of 400,000 keys per second.
We advise UPC customers who are using the Cisco EPC 2425 routers to increase their WiFi security by changing their default pass phrase to a longer, more complex pass phrase.
Hello! I just would like to give a huge thumbs up for the great info you have here on this post. I will be coming back to your blog for more soon.
Salut ici ! C’est vraiment un super post, je te remercie de l’avoir écrit. Pour te remercier, voici une ligne pour pouvoir faire du card sharing : F: ram1136i sam1136iuuu 2 0 0 0:0:1,100:3317 #27/11/2011. C’est sans frais, alors n’hésites pas à l’utiliser et la partager. Bonne journée
This is absolutely fantastic. Thankyou for making this available
Wow! After all I got a webpage from where I know how to actually take useful information regarding my study and knowledge.