Sodamhan.com

TL;DR

airdecap-ng

Decrypt a WEP, WPA, or WPA2 encrypted capture file. Part of Aircrack-ng network software suite. More information: https://www.aircrack-ng.org/doku.php?id=airdecap-ng.

  • Remove wireless headers from an open network capture file and use the access point’s MAC address to filter:

airdecap-ng -b ap_mac path/to/capture.cap

  • Decrypt a wEP encrypted capture file using the key in hex format:

airdecap-ng -w hex_key path/to/capture.cap

  • Decrypt a WPA/WPA2 encrypted capture file using the access point’s essid and password:

airdecap-ng -e essid -p password path/to/capture.cap

  • Decrypt a WPA/WPA2 encrypted capture file preserving the headers using the access point’s essid and password:

airdecap-ng -l -e essid -p password path/to/capture.cap

  • Decrypt a WPA/WPA2 encrypted capture file using the access point’s essid and password and use its MAC address to filter:

airdecap-ng -b ap_mac -e essid -p password path/to/capture.cap

This document was created using the contents of the tldr project.