love this little java program, as gerix does not want to work on my laptop
but this new version works great, much simpler then trying to type out all the commands all the time as that is how i was doing it before i found this thread. i do have a suggestion in gerix the test injection is still possible to use while trying to get enuf iv's for a key, i have used gerix in the past and on several occasions was only able to get the needed iv's but using the test injection while running the test against the clients network, it would be nice to have this available in grem wepa as well i my opinion at least. Also it would be nice if the test injection window did not automatically minimized and then disappears, if the window would stay open till i closed it that would be great just so i can verify that it was successful for the test injection. thanks for developing such a nice little java program, it has made my job a little simpler to do.
some advice for this great tool - when it gives you the option of which card to put into monitor mode. is it possible pipe in the info of the card so we don't have to iwconfig to find out which card to use. They switch between wlan1 and wlan0 every time i reboot my customized live cd.
also - if its possible to give the WPA cracker a different process so I can let it go in the background while I'm working on an other AP in the building.
The grimstall worked GREAT for installing it while customizing the distro.
THIS IS A GREAT TOOL!! unfortunately the easier this becomes the quicker WEP will die. I'm already seeing this happen out there. Most of the companies that hire me have already done this. and if they haven't I convince them to. Lets hope WPA gets cracked soon.
I hope this feedback is helpful.
i have another advice
i use option in the program and start random numbers
starting with 0000000 or 0000000000 my idea can u make all the 0 numbers start moving togother
i mean when i start the attack for wpa or wpa2 handshake its gonna be like this 00007867
the first 4 zero start moving
or another idea make 10 box and we can chouse wich number move and wich not it just an idea
good work man thxxx for this great java program
What about getting GrimWEPa to use the 33GB WPA Lookup tables?
i see there is manny way to get Handshake password , its useing aircrack-ng . my Q is can u add cowpatty to handshake attack its faster than aircrack
Problem solved, thanks a million
Last edited by pinchegringo; 09-13-2010 at 06:59 AM.
if i got handshake and make new search i cant back to the handshake i have it before and try to scan it again
can u make option thats i can put hand shake i already have it and start my scan thats will be great include cowpatty attack grimwepa use aircrack thats will be good update
i am very pleased with your grimwepa as it works fine for me with awus036nh
wep no problem at all tested varios methods available and all worked, also wpa handshake is not hard to capture and cracking is possible as long as the right dictio is on the pc.
my question is: how can i reuse the handshake cap saved in the HS file of grimwepa, after i close the app, because cracking was not possible and i need to search for another dict on the net.