LinuxCommandLibrary

airdecap-ng

TLDR

Decrypt WEP capture file

$ airdecap-ng -w [hex_key] [capture.cap]
copy
Decrypt WPA/WPA2 capture file
$ airdecap-ng -p [passphrase] -e [SSID] [capture.cap]
copy
Remove wireless headers (convert to ethernet)
$ airdecap-ng -l [capture.cap]
copy
Decrypt with BSSID filter
$ airdecap-ng -p [passphrase] -e [SSID] -b [00:11:22:33:44:55] [capture.cap]
copy

SYNOPSIS

airdecap-ng [-l] [-w key] [-p pass -e essid] [-b bssid] capture-file

DESCRIPTION

airdecap-ng decrypts WEP and WPA/WPA2 encrypted capture files when you know the key. It produces an unencrypted capture file that can be analyzed with tools like Wireshark.
The tool can also strip 802.11 wireless headers to convert captures to standard ethernet format, useful when analyzing the actual network traffic content.

PARAMETERS

-w key

WEP key in hexadecimal
-p passphrase
WPA/WPA2 passphrase
-e essid
Network name (required for WPA)
-b bssid
Access point MAC address filter
-l
Remove 802.11 header (don't decrypt)

CAVEATS

For WPA decryption, you need the passphrase AND the SSID. The capture file must contain the 4-way handshake for initial WPA key derivation. Output file is named input-dec.cap by default.

HISTORY

airdecap-ng is part of the aircrack-ng suite, developed in the mid-2000s. It provides the complementary function to aircrack-ng: once a key is recovered, airdecap-ng can decrypt the traffic for analysis.

SEE ALSO

Copied to clipboard