05-07-2013, 07:30 PM
hello how are you?? .. now i will share new tool grim wepa wireless cracking tutorial , grim wepa is tool coded on java programming , this tools is very good and not heavy when you running ,
Tools needed :
1. Airmon-ng
2. Airodump-ng
3. Aireplay-ng
4. Aircrack-ng
5. Passwordlist
6. grim wepa
7. kismet
grim wepa was include on Backtrack 4 , bugtraq V-2 beta , and matriux kripton , now i will tested on Backtrack 5R3
ok lets start
[hide]
You can download on my dropbox in here , https://www.dropbox.com/s/1rk1anr2lpnsvav/grimwepa.jar
ok after you download , you must save on directory /pentest/wireless/grimwepa , and check this image
ok bro for running this tools you must execution like this
and click Ok
Next step please look this image
Ok when you klick Ok , the interfaces will be activated mon0 , and you must refresh targets .. (choose your target for cracking)
Next image
ok next step . you must klick Start Handshake capture , you must waiting untill you get WPA Handshake like this image ..
choose type attack do you want ,i choose dictionary attack,and we goot WPA-handshake with .cap , the file has been saved on directory /pentest/wireless/grimwepa
Next step
Are you remember , i choose dictionary attack , and now i will choose passwordlist/wordlist , click start cracking and choose passwordlist > klick open
Last step
Aircrack-ng will be running and will save password on pass.txt
[/hide]
reference > http://xsanlahci.wordpress.com/2013/05/0...g-tutorial
OPEN DISCUSS ON INDONESIAN / ENGLISH LANGUAGE
Tools needed :
1. Airmon-ng
2. Airodump-ng
3. Aireplay-ng
4. Aircrack-ng
5. Passwordlist
6. grim wepa
7. kismet
grim wepa was include on Backtrack 4 , bugtraq V-2 beta , and matriux kripton , now i will tested on Backtrack 5R3
ok lets start
[hide]
Spoiler! :
You can download on my dropbox in here , https://www.dropbox.com/s/1rk1anr2lpnsvav/grimwepa.jar
ok after you download , you must save on directory /pentest/wireless/grimwepa , and check this image
Spoiler! :
ok bro for running this tools you must execution like this
Code:
java -jar grimwepa.jar
and click Ok
Next step please look this image
Spoiler! :
Ok when you klick Ok , the interfaces will be activated mon0 , and you must refresh targets .. (choose your target for cracking)
Next image
Spoiler! :
ok next step . you must klick Start Handshake capture , you must waiting untill you get WPA Handshake like this image ..
Spoiler! :
choose type attack do you want ,i choose dictionary attack,and we goot WPA-handshake with .cap , the file has been saved on directory /pentest/wireless/grimwepa
Next step
Spoiler! :
Are you remember , i choose dictionary attack , and now i will choose passwordlist/wordlist , click start cracking and choose passwordlist > klick open
Last step
Spoiler! :
Aircrack-ng will be running and will save password on pass.txt
[/hide]
reference > http://xsanlahci.wordpress.com/2013/05/0...g-tutorial
OPEN DISCUSS ON INDONESIAN / ENGLISH LANGUAGE
visit > https://xsanlahci.wordpress.com
All My Thread > http://indonesianbacktrack.or.id/forum/s...bd179f046e
All My Thread > http://indonesianbacktrack.or.id/forum/s...bd179f046e