Grim Wepa Wireless Cracking
#1
hello how are you?? .. now i will share new tool grim wepa wireless cracking tutorial , grim wepa is tool coded on java programming , this tools is very good and not heavy when you running ,

Tools needed :

1. Airmon-ng
2. Airodump-ng
3. Aireplay-ng
4. Aircrack-ng
5. Passwordlist
6. grim wepa
7. kismet

grim wepa was include on Backtrack 4 , bugtraq V-2 beta , and matriux kripton , now i will tested on Backtrack 5R3

ok lets start

[hide]
Spoiler! :
[Image: logo_zpscc431e70.png]

You can download on my dropbox in here , https://www.dropbox.com/s/1rk1anr2lpnsvav/grimwepa.jar

ok after you download , you must save on directory /pentest/wireless/grimwepa , and check this image

Spoiler! :
[Image: grimwepa1_zpsa0c4dd8f.png]

ok bro for running this tools you must execution like this
Code:
java -jar grimwepa.jar

and click Ok

Next step please look this image

Spoiler! :
[Image: grimwepa2_zps05c9660e.png]

Ok when you klick Ok , the interfaces will be activated mon0 , and you must refresh targets .. (choose your target for cracking)

Next image

Spoiler! :
[Image: grimwepa3_zps282538a5.png]

ok next step . you must klick Start Handshake capture , you must waiting untill you get WPA Handshake like this image ..

Spoiler! :
[Image: grimwepa4_zps7960e250.png]

choose type attack do you want ,i choose dictionary attack,and we goot WPA-handshake with .cap , the file has been saved on directory /pentest/wireless/grimwepa

Next step

Spoiler! :
[Image: grimwepa5_zpsa0a0f688.png]

Are you remember , i choose dictionary attack , and now i will choose passwordlist/wordlist , click start cracking and choose passwordlist > klick open

Last step

Spoiler! :
[Image: grimwepa6_zps6c7db0dd.png]

Aircrack-ng will be running and will save password on pass.txt
[/hide]
reference > http://xsanlahci.wordpress.com/2013/05/0...g-tutorial
OPEN DISCUSS ON INDONESIAN / ENGLISH LANGUAGE

#2
good posting but still brute force and must have the directory if long password it will be very dificult for knowing the password

#3
yes of course Big Grin if you dont like bruteforce trick .. you can try this trick http://indonesianbacktrack.or.id/forum/s...p?tid=2097 Big Grin enjoy

#4
Mantap Om xsan-lahci, Izin praktek Big Grin
Calon manusia sukses tidak akan pernah mengeluh, tapi akan sibuk memperbaiki diri dari semua kesalahan yang pernah dibuatnya
My Facebook
My Twitter

#5
nice share bro,,thanks for your thread,

#6
+1 dari saya Smile
kolaborasi yg mantep om.
Code:
Username :   [ Hidemichi-Hiroyuki]

Password :   [     ********      ]

#7
(05-08-2013, 02:21 AM)[H2] Wrote: +1 dari saya Smile
kolaborasi yg mantep om.

makasih bro Big Grin sedang ane buat versi CLInya nih ..






Users browsing this thread: 1 Guest(s)