Files
tldr/pages/common/airdecap-ng.md
Reinhart Previano Koentjoro d6d4561c17 pages*: fix documentation mistakes (#11641)
* a2ping: minor fixes

* ab: fix mnemonics

* ab: fix mnemonics

* ab: fix mnemonics

* abduco: add mnemonics

* accelerate: use Hugging Face as a trademark

* ack: highlight grep as a command

* acme.sh: highlight certbot as command

* act: add mnemonics

* ag: highlight ack as command

* age-keygen: add Oxford comma

* linux/shutdown: add mnemonics

* airdecap-ng: use Oxford comma

* alex: use standard path name template
2023-12-03 19:59:57 +07:00

26 lines
1.0 KiB
Markdown

# airdecap-ng
> Decrypt a WEP, WPA, or WPA2 encrypted capture file.
> Part of Aircrack-ng network software suite.
> More information: <https://www.aircrack-ng.org/doku.php?id=airdecap-ng>.
- Remove wireless headers from an open network capture file and use the access point's MAC address to filter:
`airdecap-ng -b {{ap_mac}} {{path/to/capture.cap}}`
- Decrypt a WEP encrypted capture file using the key in hex format:
`airdecap-ng -w {{hex_key}} {{path/to/capture.cap}}`
- Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword:
`airdecap-ng -e {{essid}} -p {{password}} {{path/to/capture.cap}}`
- Decrypt a WPA/WPA2 encrypted capture file preserving the headers using the access point's [e]ssid and [p]assword:
`airdecap-ng -l -e {{essid}} -p {{password}} {{path/to/capture.cap}}`
- Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword and use its MAC address to filter:
`airdecap-ng -b {{ap_mac}} -e {{essid}} -p {{password}} {{path/to/capture.cap}}`