Grimwepa - WEP and WPA Password Cracker

GRIM WEPA was written in Java and is intended for use with the Linux Operating System (specifically the Backtrack 4 distribution). GrimWepa 1.1 has been translated for Português-Brasil users. It is available in the downloads section. UpdateGRIM WEPA is no longer being supportedGRIM WEPA is on an indefinite hiatus while I work on other projects. Please use Wifite instead of GRIM WEPA. Wifite is a newer wifi cracker with more functionality and stability than GRIM WEPA. Wifite is available here: http://code.google.com/p/wifite/ Please update your bookmarks and links accordingly. This project will remain open so that I may eventually update GrimWepa. Overview GRIM WEPA is a password cracker for both WEP and WPA-encrypted access points (routers). This program uses the following applications and suites: aircrack-ng suite: aircrack-ng, to crack WPA and WEP; airodump-ng, to capture packets and find access points; airmon-ng, to enumerate devices in monitor mode; aireplay-ng, to forge and replay packets; and packetforge-ng, to create replay packets. iwconfig, to see if devices are in monitor mode; xterm, to show output to user; ifconfig, to get the MAC address of devices; macchanger, to change MAC address of wifi cards. These applications are required for GRIM WEPA to run properly. All of these applications come standard with Backtrack4. note: the settings & configuration file for Grim Wepa is saved to /etc/grimwepa.conf AboutGRIM WEPA's cracking methods are archaic and have been around for years. It simply uses the existing cracking methods in aireplay-ng (for WEP) and aircrack-ng (for WPA). Grim Wepa is similar in style and functionality to shamanvirtuel's Spoon series (SpoonWEP, SpoonWPA, and SpoonDRV). The Spoon suite is still available, though it is not kept updated. The Backtrack 4 Linux distribution has a default WEP/WPA cracker, but it does not work properly for me; also, the Spoon series does not run properly for me on BT4, so I created GRIM WEPA for myself and as an homage to shamanvirtuel. OptionsGRIM WEPA has only two options: Crack WEP-encrypted access points (routers) and crack WPA-encrypted access points. The program can search for new targets, and auto-selects your cracking method. The options for each method are as follows: Attacks for WEP-encrypted Access PointsARP-Replay attack Chop-chop attack Fragmentation attack p0841 attack Cafe-Latte attack Cracking options: aircrack-ng is able to crack just about any WEP password after about 20,000 IV (Initialization Vector) data packets have been captured. The capture usually takes about 2 minutes, and the crack another 2-3 minutes. Attacks for WPA-encrypted Access PointsBasic deauthorization attack to get handshake. Cracking: GRIM WEPA includes a 2MB default password list containing approximately 250,000 commonly-used passwords. Wordlist / Dictionary / Brute-force attack: Currently, there is only one consistent method of cracking WPA, and that is by brute force. aircrack-ng can crack hundreds of passwords per second, so this method is not nearly as arbitrary as has been proposed. ExecutionTo run GRIM WEPA, navigate to the file's location in Terminal and type: java -jar grimwepa_X.X.jarat the command line prompt, where X.X is your version of grimwepa. Run GRIM WEPA as root! I have posted a Step-by-Step Tutorial, and also a Troubleshooting Guide. InstallationInstallation is not required for GRIM WEPA to run properly, but it is recommended if you use are going to GRIM WEPA frequently. GrimWepa can be downloaded and installed by running the "grimstall.sh" script. For Backtrack Users: To download the install script via wget, change permissions on it, and run the install script (which will download the latest version of grimwepa and install it), copy-and-paste the below code into console (as root!): wget http://grimwepa.googlecode.com/files/grimstall.shchmod 755 grimstall.sh./grimstall.sh installNote: Change the directory from /pentest/wireless/grimwepa/ to whichever directory you want to install to ; /pentest/wireless is commonly found in Backtrack distributions ; all files in the selected directory will be deleted (a prompt will confirm this); don't forget the / at the end! A more-detailed installation guide can be found here, in the wiki. Sample VideosThanks to Weasek from the Backtrack-Linux forums for providing these videos! An example of using the WEP Fragmentation attack: And an example of the WPA attack (deauthentication, handshake, and brute-force dictionary attack): DonationsI have been asked, and I'm finally throwing up a donations button. all of my software is open-source and free! donating does not guarantee support or extra features. you do not need to donate money to use this toolhowever, if you want to help make my life a little easier, feel free to donate by clicking the button below:



http://code.google.com/p/grimwepa

Bookmark and Share          0



comments powered by Disqus


Related Products

WepCrackGui

Gui for aircrack-ng that can crack WEP and WPA networks, automatically scans for available networks, provides fake authentication and injection support.

Read more

OphCrack - Windows Password Cracker

Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.

Read more

ophcrack

Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds.

Read more

AutoAP

AutoAP is an add on to DD-WRT that allows routers to continuously scan for and connect to open (and predefined WEP) wireless networks. Ultimately the goal is to develop an easily deployable firmware that facilitates fast and easy mesh network creation.

Read more

PepperSpot

PepperSpot is a captive portal or wireless LAN access point controller which support the IPv6 protocol. It supports web based login and it supports Wireless Protected Access (WPA). Authentication is handled by your favorite radius server (over IPv4/IPv6)

Read more

juuso-BozoCrack

A silly & effective MD5 cracker in Ruby

Read more

wepcrack

WEPCrack is a tool that cracks 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.

Read more

Autowep - automated exectution of aircrack-ng

autowep is a bash script that will automatically crack 64 and 128 bit wep encryption on a system that has a patched madwifi driver for injection and aircrack-ng and an x windows environment on a Linux system. Visit nack.in for more about me

Read more

WepAttack

Active dictionary attack on WEP keys in WLAN networks.

Read more

Wepme - A user-friendly GUI for the WEP tools from the Aircrack suite.

GoalThis project provides a simple python GUI for the WEP tools from the Aircrack suite. ScreenshotHere is a screenshot of the Beta Version 29.12.09:

Read more

Related Tags
Browse projects by tags.

We have collection of more than 1 Million open source products ranging from Enterprise product to small libraries in all platforms. We aggregate information from all open source repositories. Search and find the best for your needs.



Follow feeds Follow bestopensource on Twitter Follow bestopensource on Facebook


Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.

Do you provide Consulting, Training, Support for any open source products. Register your business

Tag Cloud >>