1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-04-21 22:22:07 +02:00
tldr/pages/common/airdecap-ng.md
Vitor Henrique 814e511bae
pages*: add missing mnemonics (part 1) (#12143)
* pages*: add missing mnemonics

---------

Co-authored-by: Lena <126529524+acuteenvy@users.noreply.github.com>
Co-authored-by: Sebastiaan Speck <12570668+sebastiaanspeck@users.noreply.github.com>
2024-02-09 20:04:08 +05:30

1 KiB

airdecap-ng

Decrypt a WEP, WPA, or WPA2 encrypted capture file. Part of Aircrack-ng network software suite. More information: https://www.aircrack-ng.org/doku.php?id=airdecap-ng.

  • Remove wireless headers from an open network capture file and use the access point's MAC address to filter:

airdecap-ng -b {{ap_mac}} {{path/to/capture.cap}}

  • Decrypt a [w]EP encrypted capture file using the key in hex format:

airdecap-ng -w {{hex_key}} {{path/to/capture.cap}}

  • Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword:

airdecap-ng -e {{essid}} -p {{password}} {{path/to/capture.cap}}

  • Decrypt a WPA/WPA2 encrypted capture file preserving the headers using the access point's [e]ssid and [p]assword:

airdecap-ng -l -e {{essid}} -p {{password}} {{path/to/capture.cap}}

  • Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword and use its MAC address to filter:

airdecap-ng -b {{ap_mac}} -e {{essid}} -p {{password}} {{path/to/capture.cap}}