LinuxCommandLibrary

wpaclean

Extract WPA handshakes from capture files

TLDR

Clean capture file

$ wpaclean [output.cap] [input.cap]
copy
Clean multiple files
$ wpaclean [output.cap] [file1.cap] [file2.cap]
copy

SYNOPSIS

wpaclean output input ...

DESCRIPTION

wpaclean extracts WPA handshake data from wireless packet capture files, producing cleaned output files containing only the EAPOL authentication frames needed for offline password analysis. This significantly reduces file size by removing all non-handshake traffic.
Multiple input capture files can be processed and combined into a single cleaned output file. The tool is part of the aircrack-ng suite and is typically used to prepare capture files before running them through aircrack-ng or hashcat for WPA password recovery during authorized security assessments.

PARAMETERS

output

Cleaned output file.
input
Input capture files.

CAVEATS

Part of aircrack-ng. For WPA captures. EAPOL focused.

HISTORY

wpaclean is part of the aircrack-ng suite, extracting WPA handshakes from packet captures.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community