Closed GoogleCodeExporter closed 9 years ago
okswaney,
Are you asking if it's okay to add GrimWEPA to your distro?
If so, Go for it! It's open-source so you can do whatever you want with it.
There
are ways to add shortcuts to a linux desktop. I'm not sure how, but I think a
quick
Google search would let you know. (here's a thread on it:
http://www.linuxforums.org/forum/redhat-fedora-linux-help/53858-how-create-deskt
op-shortcuts-linux.html)
If Grim Wepa does not work properly on Slitaz, then I can not help you. I
wrote Grim
Wepa for Backtrack 4, and I refuse to trouble-shoot or install other distro's in
order to make it more compatible. It's an open-source program, so maybe you
can find
someone that knows Java and has the Slitaz distro you have so that they can
port it
over for you.
I apologize, but I've spent many, many hours trying to get Grim Wepa to work for
different distributions of linux (and different wifi chipsets), and I do not
want to
waste anymore time.
----------------------------
Your sequential-cracking idea is smart, and I could see good applications for
it, but
I think it would be too-easily abused: someone running Grim Wepa simply to
crack all
of their neighbor's access points. I can't see any other purpose of this
Sequential-Cracking feature except to crack other people's routers. Cracking
other
people's access points is illegal and I do not want to encourage others to do
so.
Also, some of the attacks Grim Wepa runs can take hours, even days to complete
(WPA
handshake capturing, for example; or WPA cracking using a -huge- wordlist). I
don't
think I have enough time to automate a process that could take an eternity to
finish...
However, there is a script (written in Perl) called 'wepbuster'. The website is
here:
http://code.google.com/p/wepbuster/ wepbuster comes standard on BT4, and it is
a
tool to crack all nearby WEP access points. You just run wepbuster and it
starts
cracking all nearby access points. Wepbuster seems perfect for you -- and it's
most-likely cross-compatible with Slitaz.
------------------------------
Your final request, "output ssid, mac, channel, and resolved key to text in same
directory" is what the project already does: Grim Wepa creates "pass.txt" in
the same
directory as the .jar file.
Also, in Grim Wepa, clicking on access points you've already cracked will
display the
key in this format:
WEP | Targeting: XX:XX:XX:XX:XX:XX | Key: [the key goes here]
This was a new feature in version 1.02.
-----------------------
You have some really good ideas, much better than others that I have received.
Unfortunately, I do not have enough free time to implement the requests you've
made.
And do not let this discourage you from exploring new ideas! I love hearing
feedback
and I'm working on GrimWepa v1.1 right now. I'm adding about 20 new features
to this
version; most of the new features were suggested by people just like you.
Your suggestions are great, but not what I'm looking for right now.
I hope you don't mind that I mark this issue as "closed".
Thank you.
-Derv82
Original comment by der...@gmail.com
on 19 May 2010 at 7:45
Original comment by der...@gmail.com
on 19 May 2010 at 7:46
Original issue reported on code.google.com by
okswa...@gmail.com
on 15 May 2010 at 5:01