System Grab Bag

View all TLDR pages from common (or from all pages)

airdecap-ng

Decrypt a WEP, WPA or WPA2 encrypted capture file. Part of Aircrack-ng network software suite. More information: https://www.aircrack-ng.org/doku.php?id=airdecap-ng.
  • Remove wireless headers from an open network capture file and use the access point's MAC address to filter:
    airdecap-ng -b {{ap_mac}} {{path/to/capture.cap}}
  • Decrypt a WEP encrypted capture file using the key in hex format:
    airdecap-ng -w {{hex_key}} {{path/to/capture.cap}}
  • Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword:
    airdecap-ng -e {{essid}} -p {{password}} {{path/to/capture.cap}}
  • Decrypt a WPA/WPA2 encrypted capture file preserving the headers using the access point's [e]ssid and [p]assword:
    airdecap-ng -l -e {{essid}} -p {{password}} {{path/to/capture.cap}}
  • Decrypt a WPA/WPA2 encrypted capture file using the access point's [e]ssid and [p]assword and use its MAC address to filter:
    airdecap-ng -b {{ap_mac}} -e {{essid}} -p {{password}} {{path/to/capture.cap}}

License and Disclaimer

The content on this page is copyright © 2014—present the tldr-pages team and contributors.
This page is used with permission under Creative Commons Attribution 4.0 International License.

While we do attempt to make sure content is accurate, there isn't a warranty of any kind.