{"id":1730,"date":"2025-11-09T23:42:30","date_gmt":"2025-11-09T23:42:30","guid":{"rendered":"https:\/\/www.ultrexstaff.com\/?p=1730"},"modified":"2025-11-09T23:42:31","modified_gmt":"2025-11-09T23:42:31","slug":"reveal-known-wifi-password-via-command-line","status":"publish","type":"post","link":"https:\/\/www.ultrexstaff.com\/?p=1730","title":{"rendered":"Reveal Known WiFi Password via Command Line"},"content":{"rendered":"\n<p>To reveal the password for a known Wi-Fi network (SSID) in Windows 11 using the command line, follow these steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Open Command Prompt as Administrator<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Click on the\u00a0<strong>Start<\/strong>\u00a0menu, type\u00a0<code>cmd<\/code>\u00a0or\u00a0<code>Command Prompt<\/code>\u00a0in the search bar.<\/li>\n\n\n\n<li>Right-click on\u00a0<strong>Command Prompt<\/strong>\u00a0from the search results and select\u00a0<strong>Run as administrator<\/strong>.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>List All Saved Wi-Fi Profiles<\/strong>:\n<ul class=\"wp-block-list\">\n<li>In the Command Prompt window, type the following command and press\u00a0<strong>Enter<\/strong>:sqlCopyEdit<code>netsh wlan show profiles<\/code><\/li>\n\n\n\n<li>This command will display a list of all Wi-Fi profiles that your computer has connected to previously.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Display the Password for a Specific Wi-Fi Profile<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Identify the Wi-Fi profile name (SSID) for which you want to reveal the password from the list generated in the previous step.<\/li>\n\n\n\n<li>Type the following command, replacing\u00a0<code>Your_SSID<\/code>\u00a0with the name of your Wi-Fi network, and press\u00a0<strong>Enter<\/strong>:pgsqlCopyEdit<code>netsh wlan show profile name=\"Your_SSID\" key=clear<\/code><\/li>\n\n\n\n<li>In the output, scroll to the\u00a0<strong>Security settings<\/strong>\u00a0section.<\/li>\n\n\n\n<li>Locate the line labeled\u00a0<strong>Key Content<\/strong>; the value next to it is the Wi-Fi password.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p><strong>Example<\/strong>: If your Wi-Fi network name is&nbsp;<code>HomeNetwork<\/code>, the command would be:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">pgsqlCopyEdit<code>netsh wlan show profile name=\"HomeNetwork\" key=clear\n<\/code><\/pre>\n\n\n\n<p>The output will display information about the profile, and under&nbsp;<strong>Security settings<\/strong>, you&#8217;ll find:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">yamlCopyEdit<code>Security settings:\n    ...\n    Key Content            : [Your Wi-Fi Password]\n<\/code><\/pre>\n\n\n\n<p><strong>Note<\/strong>: Ensure you have administrative privileges to execute these commands. This method works for Wi-Fi networks that your computer has previously connected to and saved.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To reveal the password for a known Wi-Fi network (SSID) in Windows 11 using the command line, follow these steps: Example: If your Wi-Fi network name is&nbsp;HomeNetwork, the command would be: pgsqlCopyEditnetsh wlan show profile name=&#8221;HomeNetwork&#8221; key=clear The output will display information about the profile, and under&nbsp;Security settings, you&#8217;ll find: yamlCopyEditSecurity settings: &#8230; Key Content [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[124,98,121,120],"tags":[],"class_list":["post-1730","post","type-post","status-publish","format-standard","hentry","category-command-line","category-it-knowledge-base-articles","category-networking","category-windows","post-preview"],"_links":{"self":[{"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/1730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1730"}],"version-history":[{"count":1,"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/1730\/revisions"}],"predecessor-version":[{"id":1731,"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/1730\/revisions\/1731"}],"wp:attachment":[{"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}