HiveBrain v1.2.0
Get Started
← Back to all entries
snippetbashTip

airdecap-ng — Decrypt a WEP, WPA, or WPA2 encrypted capture file. Part of Aircrack-ng network software suite. More

Submitted by: @import:tldr-pages··
0
Viewed 0 times
commandwepwpawpa2cliencryptedairdecap-ngdecrypt

Problem

How to use the airdecap-ng command: Decrypt a WEP, WPA, or WPA2 encrypted capture file. Part of Aircrack-ng network software suite. More information: <https://www.aircrack-ng.org/doku.php?id=airdecap-ng>.

Solution

airdecap-ng — Decrypt a WEP, WPA, or WPA2 encrypted capture file. Part of Aircrack-ng network software suite. More information: <https://www.aircrack-ng.org/doku.php?id=airdecap-ng>.

Remove wireless headers from an open network capture file and use the access point's MAC address to filter:
airdecap-ng -b {{ap_mac}} {{path/to/capture.cap}}


Decrypt a [w]EP encrypted capture file using the key in hex format:
airdecap-ng -w {{hex_key}} {{path/to/capture.cap}}


Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword:
airdecap-ng -e {{essid}} -p {{password}} {{path/to/capture.cap}}


Decrypt a WPA/WPA2 encrypted capture file preserving the headers using the access point's [e]ssid and [p]assword:
airdecap-ng -l -e {{essid}} -p {{password}} {{path/to/capture.cap}}


Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword and use its MAC address to filter:
airdecap-ng -b {{ap_mac}} -e {{essid}} -p {{password}} {{path/to/capture.cap}}

Code Snippets

Remove wireless headers from an open network capture file and use the access point's MAC address to filter

airdecap-ng -b {{ap_mac}} {{path/to/capture.cap}}

Decrypt a [w]EP encrypted capture file using the key in hex format

airdecap-ng -w {{hex_key}} {{path/to/capture.cap}}

Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword

airdecap-ng -e {{essid}} -p {{password}} {{path/to/capture.cap}}

Decrypt a WPA/WPA2 encrypted capture file preserving the headers using the access point's [e]ssid and [p]assword

airdecap-ng -l -e {{essid}} -p {{password}} {{path/to/capture.cap}}

Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword and use its MAC address to filter

airdecap-ng -b {{ap_mac}} -e {{essid}} -p {{password}} {{path/to/capture.cap}}

Context

tldr-pages: common/airdecap-ng

Revisions (0)

No revisions yet.