Description: Airdecap-NG is simple and easy to use tool and is a part of Aircrack-NG suite of products. Aircrack-NG is a set of tools for auditing wireless networks. These tools automate in between steps involved in WEP cracking, from setting the interface in monitor mode to sniffing packets, re-injecting packets, examining these packets against different attack vectors, cracking the WEP key and finally decrypting the WEP-encrypted packets. Airdecap-NG automates the last stop i.e. decrypting the wireless packets. <p> With the help of aircrack NG and other tools one can easily crack the WEP key, but the story is not complete unless one actually reads the encrypted information in clear text. Airdecap NG comes as a handy tool for this purpose. The command line inputs for this tool are input pcap file which needs to be decrypted and the encryption key in hex format. Airdecap-NG tries to decrypt every encrypted packet in the packet trace with the user provided key and stores these decrypted packets in another file in pcap file format. </p> <p> Airdecap NG is capable of decrypting WPA packets as well. For decrypting WPA packets one has to provide WPA pass phrase or Pairwise Master Key in hex. If the trace contains packets from different BSSIDs which are using different keys, the BSSID command line selection can be used so that the given key will be applied for only selected packets. </p> <p> This video will discuss the usage of Airdecap NG with some illustrative examples. </p>Newer version on wireshark (formerly known as ethereal) also provides support for decryption of WEP keys. For more details, visit wireshark video page. <p> WEP uses RC4 algorithm for generating key stream. With the help of IV (Initialization Vector) and the hex key, RC4 with PRGA can obtain the key stream which when ex-or with the encrypted packet gives the decrypted packet. </p>Links <p> 1. Airdecap-NG download</p> <p> 2. Airdecap-NG Home page</p>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.