Airdecap-ng can decrypt WEP/WPA/WPA2 capture files. Use it after aircrack-ng.
With a given ESSID and password, decrypt the specified WPA capture file
# Validate password found
DIR=/root/hs
ESSID="WIFI_NETWORK_NAME"
PASS=""
airdecap-ng -e "$ESSID" -p "$PASS" "$DIR/file.cap"
New file will be file-dec.cap