airdecap-ng
Decrypt a WEP, WPA, or WPA2 encrypted capture file. Part of Aircrack-ng network software suite. More information: <https://www.aircrack-ng.org/doku.php?id=airdecap-ng>.
Install
- All systems
-
curl cmd.cat/airdecap-ng.sh
- Debian
-
apt-get install aircrack-ng
- Ubuntu
-
apt-get install aircrack-ng
- Alpine
-
apk add aircrack-ng
- Arch Linux
-
pacman -S aircrack-ng
- Kali Linux
-
apt-get install aircrack-ng
- Fedora
-
dnf install aircrack-ng
- Windows (WSL2)
-
sudo apt-get update
sudo apt-get install aircrack-ng
- OS X
-
brew install aircrack-ng
- Raspbian
-
apt-get install aircrack-ng
- Dockerfile
- dockerfile.run/airdecap-ng
- Docker
-
docker run cmd.cat/airdecap-ng airdecap-ng
powered by Commando
Decrypt a WEP, WPA, or WPA2 encrypted capture file. Part of Aircrack-ng network software suite. More information: <https://www.aircrack-ng.org/doku.php?id=airdecap-ng>.
-
Remove wireless headers from an open network capture file and use the access point's MAC address to filter:
airdecap-ng -b ap_mac path/to/capture.cap
-
Decrypt a WEP encrypted capture file using the key in hex format:
airdecap-ng -w hex_key path/to/capture.cap
-
Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword:
airdecap-ng -e essid -p password path/to/capture.cap
-
Decrypt a WPA/WPA2 encrypted capture file preserving the headers using the access point's [e]ssid and [p]assword:
airdecap-ng -l -e essid -p password path/to/capture.cap
-
Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword and use its MAC address to filter:
airdecap-ng -b ap_mac -e essid -p password path/to/capture.cap
© tl;dr; authors and contributors