UPC Ireland Cisco EPC 2425 Router / Horizon Box
The Cisco EPC 2425 routers supplied by UPC are vulnerable to an offline dictionary attack if the WPA-PSK handshake is obtained by an attacker. The WPA-PSK pass phrase has the following features: Random, A to Z Uppercase only, 8 characters long, 208,827,064,576 possible combinations ( AAAAAAAA ZZZZZZZZ ) 26^8. We recently purchased a used rig, comprising off: Windows 7, I3 Processor, 4GB RAM, 2TB Drive, Radeon HD 5850. We generated 26 dictionary files using mask processor by ATOM, piping each letter out to its own file, for example: A: ./mp32 A?u?u?u?u?u?u?u > A.TXT = AAAAAAAA AZZZZZZZ. Using our Radeon HD5850 on standard settings, we were hitting 80,000 keys per second. Breakdown below: 26^8 = 208,827,064,576 ( 208 billion possible combinations ) 26^8 / 80,000 keys per second = 2,610,338 seconds. For 185, we had built a computer that could crack the default UPC wireless password within 30 days. The WPA-PSK handshakes were obtained using airodump-ng.