decrypt a WEP/WPA crypted pcap file


airdecap-ng [options]


airdecap-ng decrypts a WEP/WPA crypted pcap file to a unencrypted one by using the right WEP/WPA keys.


-H, --help Shows the help screen. -l Do not remove the 802.11 header. -b Access point MAC address filter. -k WPA Pairwise Master Key in hex. -e Target network SSID. For SSID containing special characters, see‐ ces_double_quote_and_single_quote_etc_in_ap_names -p Target network WPA passphrase. -w Target network WEP key in hex.


airdecap-ng -b 00:09:5B:10:BC:5A open-network.cap airdecap-ng -w 11A3E229084349BC25D97E2939 wep.cap airdecap-ng -e my_essid -p my_passphrase tkip.cap


airbase-ng(8) aireplay-ng(8) airmon-ng(8) airodump-ng(8) airodump-ng-oui-update(8) airserv-ng(8) airtun-ng(8) besside-ng(8) easside-ng(8) tkiptun-ng(8) wesside-ng(8) aircrack-ng(1) airdecloak-ng(1) airolib-ng(1) besside-ng-crawler(1) buddy-ng(1) ivstools(1) kstats(1) makeivs-ng(1) packetforge-ng(1) wpaclean(1) airventriloquist(8)


This manual page was written by Adam Cecile for the Debian system (but may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 or any later version published by the Free Software Foundation On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-li‐ censes/GPL.

Copied to clipboard
free 100$ digital ocean credit