-
Notifications
You must be signed in to change notification settings - Fork 105
Attack Types and Supported Models
soxrok2212 edited this page Mar 30, 2018
·
9 revisions
- means PSKracker will output a large amount of possible keys and should be piped into a password recovery tool, such as Hashcat.
- means you will be given one (or a handful) of possible keys.
- means you will be given one (or a handful) of possible WPS PINs.
- means there are one or more dictionaries included in the 'dicts' folder.
- means the bssid of the network is required.
- If there is a model in
code tags
listed, that is the option to use with the-t
argument in pskracker.
- ATT Arris NVG589
nvg589
- ATT Arris NVG599
nvg599
pskracker -t nvg589 | hashcat -m 2500 ATTXXXXXXX.hccapx
pskracker -t att -f
- Some models following Belkin.xxxx, belkin.xxxx and belkin.xxx SSID pattern
pskracker -t belkin -f -b 00:11:22:33:44:55 | hashcat -m 2500 belkin.hccapx
- Comcast/Xfinity Cisco DPC3939
dpc3939
- Comcast/Xfinity Cisco DPC3941
dpc3941
- Comcast/Xfinity Arris TG1682G
tg1682g
- Comcast/Xfinity Arris TG862G
pskracker -t dpc3939 -b 00:11:22:33:44:55
hashcat -m 2500 HOME-XXXX.hccapx -a 1 5num.txt 6.txt
-
5num.txt 6.txt
and6num.txt 5.txt
are dictionary order options for combinator attack
- Models following EE-Brightbox-XXXXXX and EE-XXXXXX SSID pattern
hashcat -m 2500 EE-XXXXXX.hccapx -j '$-' -a 1 3-4_4-3.txt 5-norm.txt
Possible key formats:
- 3-4_4-3.txt 5-norm.txt
- 3-5_5-3.txt 4-norm.txt
- 4-5_5-4.txt 3-norm.txt
- Models following NETGEARXX SSID pattern
hashcat -m 2500 NETGEARXX.hccapx -a 6 netgear.txt ?d?d?d
- Some models use 1 digit instead of 3
- To make the larger list, use combinator from hashcat-utils