Skip to content

Attack Types and Supported Models

soxrok2212 edited this page Jan 26, 2018 · 9 revisions

Attack Types

  • bruteforce means the output of PSKracker should be piped into a password recovery tool, such as Hashcat.
  • psk means you will be given one (or a handful) of possible keys.
  • wps means you will be given one (or a handful) of possible WPS PINs.
  • dictionary means there are one or more dictionaries included in the 'dicts' folder.
  • bssid means the bssid of the network is required.

Supported Models

ATT

  • ATT Arris NVG589 nvg589 bruteforce
  • ATT Arris NVG599 nvg599 bruteforce

Usage

pskracker -t nvg589 | hashcat -m 2500 ATTXXXXXXX.hccapx

Comcast/Xfinity

  • Comcast/Xfinity Cisco DPC3939 dpc3939 psk bssid
  • Comcast/Xfinity Cisco DPC3941 dpc3941 psk dictionary bssid
  • Comcast/Xfinity Arris TG1682G tg1682g psk dictionary bssid
  • Comcast/Xfinity Arris TG862G dictionary

Usage

pskracker -t dpc3939 -b 00:11:22:33:44:55

hashcat -m 2500 HOME-XXXX.hccapx -a 1 5num.txt 6.txt

Notes

  • 5num.txt 6.txt and 6num.txt 5.txt are dictionary order options for combinator attack

EE

  • Models following EE-Brightbox-XXXXXX SSID pattern dictionary

NETGEAR

  • Models following NETGEARXX SSID pattern dictionary

Usage

hashcat -m 2500 NETGEARXX.hccapx -a 6 netgear.txt ?d?d?d

Notes

  • Some models use 1 digit instead of 3
  • To make the larger list, use combinator from hashcat-utils
Clone this wiki locally