-
Book Overview & Buying
-
Table Of Contents
BackTrack 5 Wireless Penetration Testing Beginner's Guide
By :
We will decrypt packets from the same WEP capture file, we created earlier WEPCrackingDemo-01.cap. For this, we will use another tool in the Aircrack-ng suite called Airdecap-ng. We run the following command as shown in the following screenshot: airdecap-ng -w abcdefabcdefabcdefabcdef12 WEPCrackingDemo-01.cap, using the WEP key we cracked previously:

The decypted files are stored in a file named WEPCrackingDemo-01-dec.cap. We use the tshark utility to view the first ten packets in the file. Please note that, you may see something different based on what you captured:

WPA/WPA2 PSK would work in exactly the same way as with WEP using the airdecap-ng utility as shown in the following figure, with the airdecap-ng –p abdefgh WPACrackingDemo-01.cap –e "Wireless Lab" command:

We just saw, how we can decrypt WEP and WPA/WPA2-PSK encrypted packets using Airdecap-ng. It is interesting to note, that we can do the same using Wireshark...
Change the font size
Change margin width
Change background colour