Hacker publishes cracking tool for certain UPC wireless routers




Twitter user blasty has a tool that restores the default passwords of UPC wireless routers can be traced. This only works with routers with seven digits in the name of the network; The default password can be inferred.

The tweet refers blasty, better known as Peter Geissler, to a web page where the code for the tool is published. In his own words, he has developed one of the algorithms described in the recent work of several researchers from Radboud University in Nijmegen. The results of the study have been since last year known for big Dutch providers, including KPN and Ziggo. ACM also announced at that time to set up an investigation. It is not clear what the outcome is.

The tool of blasty would work because there is a connection between the standard WPA2 passwords and serial number of UPC routers. In addition, there would be a correlation between the default SSID for the network, and the serial number. This means that the program on the basis of the name of the wireless network may create a list with about twenty possible serial numbers. Then the tool for each serial number shows a WPA key, so that the end is very easy to log in to the router.

This means that each router with a default name and password is vulnerable to this attack. It is always wise to set a password of your choice. In addition, wireless routers providers would have to provide a default password that meets strict requirements and where there is no connection with the device serial number, as did one of the researchers of the Radboud University. There was no spokesman for Ziggo available.


In: A Technology & Gadgets Asked By: [22050 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »