{"id":440515,"date":"2010-03-17T03:00:00","date_gmt":"2010-03-17T07:00:00","guid":{"rendered":"tag:blogger.com,1999:blog-1652419620964346731.post-7296576183341217317"},"modified":"2010-03-17T03:00:00","modified_gmt":"2010-03-17T07:00:00","slug":"cracking-wep-and-wpa-using-grim-wepa","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/440515","title":{"rendered":"Cracking WEP and WPA using GRIM WEPA"},"content":{"rendered":"<p>I stumbled across a really cool new open source wireless hacking program that is installed on the new <a href=\"http:\/\/www.backtrack-linux.org\/\" >Backtrack 4<\/a> CD by default. It is a little gem that makes cracking not only WEP, but also WPA much easier. Not to mention it is a GUI program, so even your 12 year old nephew can run it. Isn\u2019t that nice?<\/p>\n<p>The program is called <a href=\"http:\/\/code.google.com\/p\/grimwepa\/\" >Grim WEPA<\/a>. From <a href=\"http:\/\/code.google.com\/p\/grimwepa\/\" >their page<\/a>, <em><span style=\"color:#0000ff;\">\u201cGRIM WEPA&#8217;s cracking methods are archaic and have been around for years. It simply uses the existing cracking methods in aireplay-ng (for WEP) and aircrack-ng (for WPA). Grim Wepa is similar in style and functionality to shamanvirtuel&#8217;s Spoon series (SpoonWEP, SpoonWPA, and SpoonDRV). The Spoon suite is still available, though it is not kept updated.\u201d<\/span><\/em><\/p>\n<p>Here are the attacks they use from <a href=\"http:\/\/code.google.com\/p\/grimwepa\/\" >their page<\/a>:<\/p>\n<h5>Attacks for WEP-encrypted Access Points<\/h5>\n<ul>\n<li>ARP-Replay attack <\/li>\n<li>Chop-chop attack <\/li>\n<li>Fragmentation attack <\/li>\n<li>p0841 attack <\/li>\n<li>Cafe-Latte attack <\/li>\n<li>Cracking options:\n<ul>\n<li>aircrack-ng is able to crack just about any WEP password after about 20,000 IV (Initialization Vector) data packets have been captured. The capture usually takes about 2 minutes, and the crack another 2-3 minutes. <\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h5>Attacks for WPA-encrypted Access Points<\/h5>\n<ul>\n<li>Basic deauthorization attack to get handshake. <\/li>\n<li>Cracking:\n<ul>\n<li>GRIM WEPA includes a 2MB default password list containing approximately 250,000 commonly-used passwords. <\/li>\n<li>Wordlist \/ Dictionary \/ Brute-force attack: Currently, there is only one consistent method of cracking WPA, and that is by brute force. aircrack-ng can crack hundreds of passwords per second, so this method is not nearly as arbitrary as has been proposed. <\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Here is a video (With no sound) of Grim WEPA being used in a WPA2 dictionary attack:<\/p>\n<p> <center><embed src=\"http:\/\/www.youtube.com\/v\/3GdorNVFv6U&amp;hl=en_US&amp;fs=1&amp;color1=0x3a3a3a&amp;color2=0x999999\" type=\"application\/x-shockwave-flash\" allowscriptaccess=\"always\" allowfullscreen=\"true\" width=\"480\" height=\"385\"><\/embed><\/center>  <\/p>\n<p>I think I am going to try to include this little toy in <a href=\"http:\/\/puntu.bauer-power.net\/\" >Bauer-Puntu<\/a> 10.04 when it comes out. What do you think? Pretty cool right? Know of any other good WEP\/WPA cracking tools? What about for Windows or Mac? Let us know your favorites in the comments! <\/p>\n<\/p>\n<div style=\"padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px\" id=\"scid:0767317B-992E-4b12-91E0-4F059A8CECA8:548e4387-b385-43a0-9b8c-f2ddd6319395\" class=\"wlWriterEditableSmartContent\">Technorati Tags: <a href=\"http:\/\/technorati.com\/tags\/grim+wepa\" rel=\"tag\">grim wepa<\/a>,<a href=\"http:\/\/technorati.com\/tags\/wpa\" rel=\"tag\">wpa<\/a>,<a href=\"http:\/\/technorati.com\/tags\/wep\" rel=\"tag\">wep<\/a>,<a href=\"http:\/\/technorati.com\/tags\/wpa2\" rel=\"tag\">wpa2<\/a>,<a href=\"http:\/\/technorati.com\/tags\/wireless\" rel=\"tag\">wireless<\/a>,<a href=\"http:\/\/technorati.com\/tags\/hack\" rel=\"tag\">hack<\/a>,<a href=\"http:\/\/technorati.com\/tags\/crack\" rel=\"tag\">crack<\/a>,<a href=\"http:\/\/technorati.com\/tags\/attack\" rel=\"tag\">attack<\/a><\/div>\n<\/p>\n<div class=\"blogger-post-footer\"><Br \/><center><a href=\"http:\/\/www.anrdoezrs.net\/click-3773910-10438541?cm_mmc=CJ-_-2769020-_-3773910-_-Home_468x60-Anim_8-24-2006\" ><br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.ftjcfx.com\/image-3773910-10438541\" width=\"468\" height=\"60\" alt=\"Great Deals @ Geeks.com!\" border=\"0\"\/><\/a><\/center><img width='1' height='1' src='https:\/\/blogger.googleusercontent.com\/tracker\/1652419620964346731-7296576183341217317?l=www.bauer-power.net' alt='' \/><\/div>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:dnMXMwOfBR0\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?d=dnMXMwOfBR0\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?i=vBj98DdsBCE:CKD3XiozvIM:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:gIN9vFwOqvQ\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?i=vBj98DdsBCE:CKD3XiozvIM:gIN9vFwOqvQ\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:YwkR-u9nhCs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?d=YwkR-u9nhCs\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?i=vBj98DdsBCE:CKD3XiozvIM:F7zBnMyn0Lo\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:wF9xT3WuBAs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?i=vBj98DdsBCE:CKD3XiozvIM:wF9xT3WuBAs\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:jTJX5pvEcCQ\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?i=vBj98DdsBCE:CKD3XiozvIM:jTJX5pvEcCQ\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:TzevzKxY174\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?d=TzevzKxY174\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:7Q72WNTAKBA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?d=7Q72WNTAKBA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:nHK9nIK91uw\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?i=vBj98DdsBCE:CKD3XiozvIM:nHK9nIK91uw\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?a=vBj98DdsBCE:CKD3XiozvIM:tdI4wLSbWXI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Bauer-power?i=vBj98DdsBCE:CKD3XiozvIM:tdI4wLSbWXI\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/Bauer-power\/~4\/vBj98DdsBCE\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I stumbled across a really cool new open source wireless hacking program that is installed on the new Backtrack 4 CD by default. It is a little gem that makes cracking not only WEP, but also WPA much easier. Not to mention it is a GUI program, so even your 12 year old nephew can [&hellip;]<\/p>\n","protected":false},"author":1521,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-440515","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/440515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1521"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=440515"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/440515\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=440515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=440515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=440515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}