Let me know if you are interested in "optimization" feedback. Not "bugs" necessarily but testing feedback. I am testing the grimwepa on different Distros including but not limited to BT4. On Ubuntu 10.04.1, With the AR9285, I get the "no fake authentication" message (and I am near my AP) until I dramatically reduce the injection speed. Only ARP-Replay works for generating high #/s rates. With the r8187, I did not get the "no fake authentication" message and was able to use high injection rates...but, once again...only ARP-Replay worked for an attack. I would like to get the other attacks working but as you said in your wiki, both APs and wireless cards vary greatly with grimwepa. Let me know if I can do other optimization tests for you. Love the small but effective GUI!
I am now working on a different wifi-cracker project called "Wifite". Wifite is basically an automated GrimWepa.
If you want to help me, you could test the newer Wifite script. To download and run Wifite, copy/paste this code into terminal:
The Wifite project homepage is: wifite - Project Hosting on Google CodeCode:wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py chmod +x wifite.py python wifite.py
Feel free to submit bugs, issues, feature requests, and comments to: Issues - wifite - Project Hosting on Google Code
Wow. I can see now why you have switched your effort and resources to wifite. Very very nice program. Excellent job! Have the BT4 moderator close out this thread.
i will test it tonight.