
Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition
By :

We can proceed with the following steps:
We will decrypt packets from the WEP capture file we created earlier: WEPCrackingDemo-01.cap
. For this, we will use another tool in the Aircrack-ng suite called airdecap-ng
. We will run the following command, as shown in the following screenshot, using the WEP key we cracked previously:
airdecap-ng -w abcdefabcdefabcdefabcdef12 WEPCrackingDemo-02.cap
The decrypted files are stored in a file named WEPCrackingDemo-02-dec.cap
. We use the tshark
utility to view the first ten packets in the file. Please note that you may see something different based on what you captured:
WPA/WPA2 PSK will work in exactly the same way as with WEP, using the airdecap-ng
utility, as shown in the following screenshot, with the following command:
airdecap-ng –p abdefg WPACrackingDemo-02.cap –e "Wireless Lab"
We just saw how we can decrypt WEP and WPA/WPA2-PSK encrypted packets using Airdecap-ng
. It is interesting...