O'Reilly logo

BackTrack 5 Wireless Penetration Testing Beginner’s Guide by Vivek Ramachandran

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Time for action decrypting WEP and WPA packets

  1. We will decrypt packets from the same WEP capture file, we created earlier WEPCrackingDemo-01.cap. For this, we will use another tool in the Aircrack-ng suite called Airdecap-ng. We run the following command as shown in the following screenshot: airdecap-ng -w abcdefabcdefabcdefabcdef12 WEPCrackingDemo-01.cap, using the WEP key we cracked previously:
    Time for action decrypting WEP and WPA packets
  2. The decypted files are stored in a file named WEPCrackingDemo-01-dec.cap. We use the tshark utility to view the first ten packets in the file. Please note that, you may see something different based on what you captured:
  3. WPA/WPA2 PSK would work in exactly ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required