Skip to main content

How To Find Wi-Fi Password Using CMD Of All Connected Networks

It is very easy to find WiFi password using few cmd commands. This command works even when you are offline or you are connected to some other WiFi network. Using this command, we can further optimize our particular WiFi network like turning on some features such as mac randomization, changing the radio type of your WiFi etc.

           Whenever we connect to a WiFi network and enter the password to connect to that network, we actually make a WLAN profile of that WiFi network. That profile is stored inside our computer along with the other required details of the WiFi profile.

                                 How To Find Wi-Fi Password Using CMD Of All Connected Networks

  Instead of using a GUI to find the individual passwords, we can also look for the WiFi password of that particular WiFi network using cmd.These steps work even when you are totally offline or you are not connected to the particular wifi you are looking the password for.

How to know the WiFi password using cmd:
  • Open the command prompt and run it as administrator.
command prompt run as administrator
  • In the next step, we want to know about all the profiles that are stored in our computer. So, type the following command in the cmd:

netsh wlan show profile

This command will list out all the WiFi profiles that you have ever connected to.

netsh wlan show profile

In the above picture, I have intentionally blurred some of my WiFi networks’ name. As you can see, there are eight WiFi networks that I connect to. So, let’s go and find out the password for the WiFi ‘NETGEAR50’ in this case which I created intentionally for this article.
  • Type the following command to see the password of any WiFi network:
netsh wlan show profile WiFi-name key=clear

netsh wlan show profile wifi-name key=clear wifi password using cmd
  • Under the security settings, in the ‘key content’, you see the WiFi password of that particular network.
Besides knowing the password, you can also use this result to further optimize your WiFi. For example, Under the profile information, you can see mac randomization is disabled. You can turn on mac randomization feature to avoid your location tracking based on the device’s MAC address.
Here is how to turn on mac randomization on Windows 10:
  • Go to settings and click on ‘Network & internet’
  • Choose the ‘WiFi’ in the left pane and click on the advanced option.
Advanced option wifi settings
  • Turn on the ‘Random Hardware Address’ feature under this settings. If your wireless hardware does not support this feature, the “Random Hardware Addresses” section will not show up at all in the settings app.
  • Once you have turned this on, you are done.

Also, under the connectivity settings, in radio type, you can see the whole list. Channel interference could be another reason for a slow WiFi. So, next time, you might also like to change the radio type settings for a better speed.

As far as radio type is concerned, you can also change that in your router for a better connection or connectivity. For this purpose, we have a dedicated article on to increase WiFi speed by choosing correct WiFi channel.

If you are also aware of some more tricks and tweaks like this, please put them in the comment below. We would be happy to feature some of those in our next articles.

Comments

Popular posts from this blog

HOW TO HACK FACEBOOK ACCOUNT BY PHISHING [HOSTING]

Hack Facebook account by PHISHING (WEBHOSTING) It is a process to create a fake page of any website which feels and look like original website and sending to victim. By entering details by the victim, the details comes to us. It is some long method but good method. Step 1: You will need these files in next steps. Download these files from  here Step 2: Now go to free hosting sites. There are many but I used to use 000Webhost. Now create your account signing up there. After signing up, confirm your account with confirmation link sent in your e-mail. Sign up  here . Step 3: Now login your account. Step 4: Click on create new account. Step 5: Create your domain name and fill required information. Step 6: Now go to Control Panel and then click on File Manager. Step 7: Click on public_html. Step 8: Delete default.php file and click on upload. Step 9: Now upload your downloaded files. Now your phishing page is ready. Your phishing l...

CREATE WHATSAPP GROUP INVITATION LINK

How to create Whatsapp group Invitation link [Now available in Original Whatsapp also] Hello friends, now you can create your own group invitation link in whatsapp to add members themselves. If you want to create a group invitation link then read all. It is very simple method. Below, the page is looking long because I have given in full details with screenshots. Requirements:  You must be  Admin  of that group. Whatsapp Nano .  Click here  to download. Patience. STEP 1: Go to that  group  which you want to create a link. STEP 2: Click to  menu  (i.e. 3 dots). STEP 3. Click on  Group info . STEP 4: Click on  Add participant.. STEP 5:  Here, click on  Invite to group via link .                                                 STEP 6:  Copy  the given link.    ...

WHAT IS HACKING ? THINGS YOU SHOULD KNOW ABOUT HACKING.

There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking. Types of Hackers Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent. 1.Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments. 2.Cracker (Black hat): A hacker who gains unauthorized access to ...