airdecap-ng

Decrypt a WEP, WPA, or WPA2 encrypted capture file. Part of Aircrack-ng network software suite. More information: <https://www.aircrack-ng.org/doku.php?id=airdecap-ng>.

Install

All systems
curl cmd.cat/airdecap-ng.sh
Debian Debian
apt-get install aircrack-ng
Ubuntu
apt-get install aircrack-ng
Alpine
apk add aircrack-ng
Arch Arch Linux
pacman -S aircrack-ng
image/svg+xml Kali Linux
apt-get install aircrack-ng
Fedora
dnf install aircrack-ng
Windows (WSL2)
sudo apt-get update sudo apt-get install aircrack-ng
OS X
brew install aircrack-ng
Raspbian
apt-get install aircrack-ng
Docker
docker run cmd.cat/airdecap-ng airdecap-ng powered by Commando

Decrypt a WEP, WPA, or WPA2 encrypted capture file. Part of Aircrack-ng network software suite. More information: <https://www.aircrack-ng.org/doku.php?id=airdecap-ng>.

  • Remove wireless headers from an open network capture file and use the access point's MAC address to filter:
    airdecap-ng -b ap_mac path/to/capture.cap
  • Decrypt a WEP encrypted capture file using the key in hex format:
    airdecap-ng -w hex_key path/to/capture.cap
  • Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword:
    airdecap-ng -e essid -p password path/to/capture.cap
  • Decrypt a WPA/WPA2 encrypted capture file preserving the headers using the access point's [e]ssid and [p]assword:
    airdecap-ng -l -e essid -p password path/to/capture.cap
  • Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword and use its MAC address to filter:
    airdecap-ng -b ap_mac -e essid -p password path/to/capture.cap

© tl;dr; authors and contributors