-
Notifications
You must be signed in to change notification settings - Fork 108
Attack Types and Supported Models
soxrok2212 edited this page Jan 26, 2018
·
9 revisions
-
means the output of PSKracker should be piped into a password recovery tool, such as Hashcat.
-
means you will be given one (or a handful) of possible keys.
-
means you will be given one (or a handful) of possible WPS PINs.
-
means there are one or more dictionaries included in the 'dicts' folder.
-
means the bssid of the network is required.
- ATT Arris NVG589
nvg589
- ATT Arris NVG599
nvg599
pskracker -t nvg589 | hashcat -m 2500 ATTXXXXXXX.hccapx
- Comcast/Xfinity Cisco DPC3939
dpc3939
- Comcast/Xfinity Cisco DPC3941
dpc3941
- Comcast/Xfinity Arris TG1682G
tg1682g
- Comcast/Xfinity Arris TG862G
pskracker -t dpc3939 -b 00:11:22:33:44:55
hashcat -m 2500 HOME-XXXX.hccapx -a 1 5num.txt 6.txt
-
5num.txt 6.txt
and6num.txt 5.txt
are dictionary order options for combinator attack
- Models following EE-Brightbox-XXXXXX SSID pattern
- Models following NETGEARXX SSID pattern
hashcat -m 2500 NETGEARXX.hccapx -a 6 netgear.txt ?d?d?d
- Some models use 1 digit instead of 3
- To make the larger list, use combinator from hashcat-utils