Skip to content

Attack Types and Supported Models

soxrok2212 edited this page Mar 30, 2018 · 9 revisions

Attack Types

  • bruteforce means PSKracker will output a large amount of possible keys and should be piped into a password recovery tool, such as Hashcat.
  • psk means you will be given one (or a handful) of possible keys.
  • wps means you will be given one (or a handful) of possible WPS PINs.
  • dictionary means there are one or more dictionaries included in the 'dicts' folder.
  • bssid means the bssid of the network is required.
  • If there is a model in code tags listed, that is the option to use with the -t argument in pskracker.

Supported Models


  • ATT Arris NVG589 nvg589 bruteforce
  • ATT Arris NVG599 nvg599 bruteforce


pskracker -t nvg589 | hashcat -m 2500 ATTXXXXXXX.hccapx

pskracker -t att -f


  • Some models following Belkin.xxxx, belkin.xxxx and SSID pattern psk bssid


pskracker -t belkin -f -b 00:11:22:33:44:55 | hashcat -m 2500 belkin.hccapx


  • Comcast/Xfinity Cisco DPC3939 dpc3939 psk bssid
  • Comcast/Xfinity Cisco DPC3941 dpc3941 psk dictionary bssid
  • Comcast/Xfinity Arris TG1682G tg1682g psk dictionary bssid
  • Comcast/Xfinity Arris TG862G dictionary


pskracker -t dpc3939 -b 00:11:22:33:44:55

hashcat -m 2500 HOME-XXXX.hccapx -a 1 5num.txt 6.txt


  • 5num.txt 6.txt and 6num.txt 5.txt are dictionary order options for combinator attack


  • Models following EE-Brightbox-XXXXXX and EE-XXXXXX SSID pattern dictionary


hashcat -m 2500 EE-XXXXXX.hccapx -j '$-' -a 1 3-4_4-3.txt 5-norm.txt


Possible key formats:

  • 3-4_4-3.txt 5-norm.txt
  • 3-5_5-3.txt 4-norm.txt
  • 4-5_5-4.txt 3-norm.txt


  • Models following NETGEARXX SSID pattern dictionary


hashcat -m 2500 NETGEARXX.hccapx -a 6 netgear.txt ?d?d?d


  • Some models use 1 digit instead of 3
  • To make the larger list, use combinator from hashcat-utils
Clone this wiki locally
You can’t perform that action at this time.