Attack Types and Supported Models - andrewjlamarche/PSKracker GitHub Wiki
Attack Types
means PSKracker will output a large amount of possible keys and should be piped into a password recovery tool, such as Hashcat.
means you will be given one (or a handful) of possible keys.
means you will be given one (or a handful) of possible WPS PINs.
means there are one or more dictionaries included in the 'dicts' folder.
means the bssid of the network is required.
- If there is a model in 
code tagslisted, that is the option to use with the-targument in pskracker. 
Supported Models
ATT
- ATT Arris NVG589 
nvg589 - ATT Arris NVG599 
nvg599 
Usage
pskracker -t nvg589 | hashcat -m 2500 ATTXXXXXXX.hccapx
pskracker -t att -f
Belkin
- Some models following Belkin.xxxx, belkin.xxxx and belkin.xxx SSID pattern 
 
Usage
pskracker -t belkin -f -b 00:11:22:33:44:55 | hashcat -m 2500 belkin.hccapx
Comcast/Xfinity
- Comcast/Xfinity Cisco DPC3939 
dpc3939 - Comcast/Xfinity Cisco DPC3941 
dpc3941 - Comcast/Xfinity Arris TG1682G 
tg1682g - Comcast/Xfinity Arris TG862G 
 
Usage
pskracker -t dpc3939 -b 00:11:22:33:44:55
hashcat -m 2500 HOME-XXXX.hccapx -a 1 5num.txt 6.txt
Notes
5num.txt 6.txtand6num.txt 5.txtare dictionary order options for combinator attack
EE
- Models following EE-Brightbox-XXXXXX and EE-XXXXXX SSID pattern 
 
Usage
hashcat -m 2500 EE-XXXXXX.hccapx -j '$-' -a 1 3-4_4-3.txt 5-norm.txt
Notes
Possible key formats:
- 3-4_4-3.txt 5-norm.txt
 - 3-5_5-3.txt 4-norm.txt
 - 4-5_5-4.txt 3-norm.txt
 
NETGEAR
- Models following NETGEARXX SSID pattern 
 
Usage
hashcat -m 2500 NETGEARXX.hccapx -a 6 netgear.txt ?d?d?d
Notes
- Some models use 1 digit instead of 3
 - To make the larger list, use combinator from hashcat-utils