Jiggy Crack is a utility I wrote to create dictionary files that will crack the default passwords of select wireless gateways. If it is the default SSID and password, it will be cracked 100% of the time. It is for educational purposes only and not intended for networks other than your own.
You will need the crunch utility installed and in your $PATH as well.
It supports the following wireless gateways:
Arris DG860
Arris TG862
Arris TG1672
Arris DG1670
Motorola Surfboard SBG6580 (Devices with a SSID of SBG650..., not newer devices with a SSID of MOTOROLA-...)
Ubee DDW365
Ubee DVW3201
Belkin router models with the SSIDs of belkin.xxx or Belkin.XXXX
Technicolor TC8717T
Technicolor TC8715D
The following video demonstrates the functionality of Jiggy Crack in tandem with aircrack. More gateways have been added since the video was created. This is the link to the Jiggy Crack script.
In this example, the SSID of the target network is TG1672GF2. I have my handshake in the cap file (the handshake I got with permission from the owner). I run jcrack.sh, it asks me to choose the router. By the SSID we know this is an Arris TG1672G, so option 7 is selected. Then it asks for the last 2 characters of the SSID, in this case "F2". It creates the dictionary file containing the password. Then we run aircrack-ng with our newly-created dictionary file against the handshake and *POOF!*.
Written by Jeremy Drahos. If you have any suggestions, questions, or would (please) like to submit your own gateway, email me at jcrack at thedrahos dot net.
I have verified 100% success for each model against TWC-distributed gateways.
Featured in pentesting distros such as BlackArch
and Travis Smith likes to "get jiggy wit it".