WPA-Buddy deciphers WPA-PSK encrypted data by using a password. It is a useful tool for extracting sensitive information for security analysis purposes.
One added benefit of wpa-buddy is that it provides users with nice output that accurately describes what's happening. Furthermore, wpa-buddy currently supports WPA and WPA2 (with the unstable version supporting the latter specifically).
To use wpa-buddy, you'll need a wireless card that can be put into monitor mode (note that ndiswrapper is not supported). Additionally, you'll need a WPA passphrase or Pre-Shared Secret, and possibly an authorization from any other WLAN users.
When it comes to usage, wpa-buddy has a number of options to choose from. < input method > is either -r file (read input from a pcap file) or -i interface (read input from a network interface). < output method > can be set to either -t (output to stdin) or -d file (output to a pcap file). There are also several < options > to choose from, such as setting a network name (-n SSID), passphrase (-p pass), or even a PSK (-k 015A43F1.. with 32 bytes).
If you'd like to disable colors or specify a verbosity level, you can do so by enabling -w or -v level respectively. Lastly, to access help, simply use the -h command.
Debug messages (keys, management messages) are sent to stderr, and with the -t option, you can choose whether output is sent to stdin or not.
This release of wpa-buddy includes only minor code improvements, but it now comes with a test file included in the distribution.
Version 0.21: N/A