airdecloak-ng
Remove WEP cloaking from wireless capture files
TLDR
SYNOPSIS
airdecloak-ng -i input [--bssid bssid | --ssid essid] [options]
DESCRIPTION
airdecloak-ng filters out WEP cloaking techniques from wireless capture files. Some access points implement cloaking by injecting fake or corrupted packets to confuse WEP cracking tools.This tool identifies and removes these cloaking packets, producing a cleaner capture file that can be more effectively analyzed or cracked.
PARAMETERS
-i file
Input capture file (pcap format).-o file
Output file for valid (cleaned) packets. Default: <src>-filtered.pcap.-c file
Output file for cloaked packets. Default: <src>-cloaked.pcap.-u file
Output file for unknown/ignored packets. Default: invalid_status.pcap.--bssid mac
Filter by access point MAC address.--ssid essid
Filter by network ESSID.--filters list
Apply filtering methods in order (signal, duplicatesn, duplicatesnap, duplicatesnclient, consecutivesn, duplicateiv, signaldupconsecsn).--null-packets
Treat null packets as potentially cloaked.--disable-base-filter
Skip base filtering logic.--drop-frag
Remove fragmented packets.
CAVEATS
Only useful for captures from access points using WEP cloaking. Modern networks using WPA/WPA2 don't use these cloaking techniques. May remove legitimate packets if cloaking detection is too aggressive.
HISTORY
airdecloak-ng was added to the aircrack-ng suite to counter specific WEP protection mechanisms that some access point vendors implemented in the late 2000s.
SEE ALSO
aircrack-ng(1), airodump-ng(1)
