by William Sanders
Finding a saved WiFi password on Windows takes seconds — navigate to the Network and Sharing Center, open adapter properties, and the Security tab reveals the stored key in plain text. Our team covers every retrieval method available in Windows 10 and Windows 11 below, from the three-click GUI path to bulk Command Prompt exports. Anyone already investigating connectivity issues will find our guide on how to improve WiFi signal strength a natural companion to this workflow, and both topics fall squarely within our tech tips coverage.
Windows stores all network credentials in WLAN profiles — encrypted XML configuration files managed by the WLAN AutoConfig service. The Data Protection API (DPAPI) encrypts each passphrase at rest, binding it to the local machine account. Administrator-level access unlocks every retrieval path described here. Standard user accounts can still access credentials for the currently connected network via the GUI method, without elevation.
The techniques below apply identically to Windows 10 and Windows 11 at the command line level. Minor UI differences exist in the Settings app between builds, but the netsh wlan syntax is unchanged. Our team has verified all three methods across multiple OS versions and build revisions.
Contents
Windows manages all wireless connectivity through the WLAN AutoConfig service — wlansvc in the services registry. This service handles network discovery, profile management, and automatic reconnection at every boot and resume cycle. Each saved network generates a distinct WLAN profile stored under C:\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\. The files are XML-structured and human-readable in format, but the key material is DPAPI-encrypted and not directly parseable without the correct decryption context.
The service exposes a documented public API — WlanGetProfile — that allows processes with sufficient privileges to request the plaintext passphrase directly. Both the built-in GUI and command-line tools call this API internally. No reverse engineering or third-party tooling is required to access stored credentials through legitimate channels.
DPAPI operates at either the user level or the machine level. WiFi profiles use machine-level DPAPI, meaning any local administrator can decrypt them regardless of which user account originally saved the network. This is an intentional design decision — network connectivity must remain accessible across user sessions on shared machines.
%ProgramData%\Microsoft\Wlansvc\Profiles\Interfaces\{adapter-GUID}\<keyMaterial> node containing the plaintext key when exported with the /key flagUnderstanding this architecture is essential for anyone responsible for network security posture. Any local administrator account can read every stored passphrase on the machine. This reinforces why strong local account policies and physical device security are non-negotiable baselines. Our team's complete hardening checklist for network credentials is covered in the guide on how to secure a home WiFi network.
Most people encounter this need in predictable, recurring situations. The password was configured years ago, the router documentation is gone, and a new device needs credentials. Our team identifies six scenarios that account for the vast majority of credential retrieval requests:
In enterprise and managed IT contexts, the netsh wlan export profile command used for a single machine scales directly to batch scripts executed via Group Policy or remote management tools. The output is consistent and machine-parseable — well-suited for automated inventory pipelines.
Credential retrieval is only appropriate on networks the operator owns or formally administers. Computer fraud statutes in most jurisdictions treat unauthorized access to stored credentials as a criminal offense, even when the technical method requires no exploitation. Our team recommends explicit documented authorization before performing any credential audit in a professional or contractual context.
Home users have full authorization on their own hardware by definition. Managed IT contexts require scope definition — typically formalized in a network access policy, change management ticket, or written authorization from the network owner.
The GUI method requires no administrator elevation for the currently connected network. It operates through the legacy Control Panel interface, which remains fully functional in both Windows 10 and Windows 11 despite progressive migration toward the Settings app. The navigation path is: Control Panel → Network and Internet → Network and Sharing Center → active connection link → Wireless Properties → Security tab → Show characters.
This path is limited to the currently connected network only. For saved-but-inactive profiles — networks within range or previously connected networks no longer available — Command Prompt or PowerShell is required. The GUI method cannot enumerate or access any profile except the active one.
The netsh wlan command set is the most capable built-in tool for WLAN profile management. It operates on all saved profiles regardless of current connection state. Core commands used in credential retrieval:
netsh wlan show profiles — enumerates all saved WLAN profiles by namenetsh wlan show profile name="NetworkName" key=clear — reveals the plaintext passphrase for a specific profilenetsh wlan export profile key=clear folder="C:\Export" — exports all profiles as XML files with unencrypted key materialPro insight: Running netsh wlan show profile name="NetworkName" key=clear as administrator is the single fastest method for credential retrieval — it is fully scriptable, produces consistent output, and works on every Windows version from 7 through 11.
PowerShell provides the same access via .NET interop with the native WLAN API. The PowerShell approach is preferred in automation contexts where output requires structured formatting, programmatic parsing, or integration with a broader inventory or reporting pipeline.
Windows Credential Manager — accessible via control keymgr.dll — stores domain passwords, RDP session credentials, and certificate-based tokens. WiFi passphrases are not stored here. They exist exclusively in WLAN profiles. Credential Manager is the correct tool for recovering stored network drive passwords and domain authentication tokens, not wireless keys.
Our team flags this distinction because the two are routinely confused. Credential Manager shows nothing relevant for WiFi, which leads many people to conclude the password is unrecoverable — when the WLAN profile path is, in fact, entirely intact and accessible via netsh.
| Method | Admin Required | Works Offline | Bulk Export | OS Compatibility |
|---|---|---|---|---|
| Network and Sharing Center (GUI) | No — current network only | No | No | Windows 10, 11 |
| netsh wlan show profile key=clear | Yes | Yes | No (per-profile) | Windows 7, 8, 10, 11 |
| netsh wlan export profile key=clear | Yes | Yes | Yes — all profiles | Windows 7, 8, 10, 11 |
| PowerShell (WlanGetProfile API) | Yes | Yes | Yes — scriptable | Windows 10, 11 |
| Windows Credential Manager | No | Yes | No | Not applicable for WiFi |
This is the correct path for home users who need a single password with minimal technical overhead. It works on the active connection only and requires no elevation.
ncpa.cpl, and press Enter to open Network ConnectionsThis bypasses the longer Control Panel navigation path and works on all current Windows builds. It is limited strictly to the currently connected network. No offline or inactive profile access is available through this method.
The netsh wlan method accesses all saved profiles, connected or not. Our team considers this the definitive procedure for how to find saved WiFi password on Windows — it is fast, reliable, and works on every Windows version released since Vista.
netsh wlan show profiles — identify the target profile name from the output listnetsh wlan show profile name="PROFILE_NAME" key=clear — substitute the exact profile nameThe output also includes the authentication type, cipher algorithm, and connection mode. This information is directly useful for diagnosing compatibility issues with older devices, embedded systems, or IoT hardware with limited protocol support. For anyone simultaneously configuring device access policies, our guide on how to set up parental controls on a home router covers how credential and MAC-based filtering interact at the firmware level.
PowerShell provides the cleanest path for bulk credential retrieval across all saved profiles simultaneously. The following one-liner returns every saved profile name paired with its plaintext key:
(netsh wlan show profiles) | Select-String "\:(.+)$" | %{$name=$_.Matches.Groups[1].Value.Trim(); $_} | %{(netsh wlan show profile name="$name" key=clear)} | Select-String "Key Content\W+\:(.+)$" | %{$_.Matches.Groups[1].Value.Trim()}
This outputs a flat list of passphrases in the same order as the profile enumeration. For structured output with profile name and key pairs, extend the pipeline to construct a PSObject per profile and export the collection to CSV. Our team uses this approach for pre-deployment documentation on managed Windows endpoints and as part of quarterly credential audits on fleet machines.
Every saved WLAN profile is a stored credential. Profiles accumulated from hotel networks, conference venues, airports, and former workplaces expand the attack surface on any machine where credential theft is a realistic concern. Our team audits WLAN profiles on all managed machines on a quarterly cycle.
Removal paths by preference:
netsh wlan delete profile name="NetworkName"netsh wlan delete profile name=* i=* — removes all saved profiles immediatelyThe bulk delete command should be executed with deliberate caution on primary workstations. All credentials are lost permanently and cannot be recovered from the WLAN profile path after deletion. Our team documents all profile names and keys prior to any bulk operation. This is non-negotiable practice before running fleet-wide profile resets.
WEP and TKIP profiles discovered during enumeration should be treated as an immediate remediation priority. Both authentication protocols are cryptographically broken. Any network still operating on WEP or TKIP should have its router reconfigured to WPA2-AES or WPA3 before the next connection attempt.
Periodic credential audits catch weak passphrases, unauthorized profile additions, and protocol downgrades before they become security incidents. A clean, documented profile inventory also reduces association latency on machines with large numbers of saved networks — the WLAN AutoConfig service evaluates all saved profiles during each association attempt.
Our recommended audit checklist:
netsh wlan export profile key=clear and archive the output with a date-stamped filenameWPA3 adoption remains incomplete across consumer and prosumer hardware. WPA2-AES with a strong, unique passphrase remains the practical baseline for most home and small-office deployments. Our team tracks authentication protocol support across all device inventories and escalates WEP or TKIP findings to immediate remediation, regardless of the network's perceived threat exposure.
Standard user accounts can retrieve the password for the currently connected network using the GUI method via Network and Sharing Center. Any saved-but-inactive profile requires administrator privileges. The netsh wlan command and PowerShell export methods both require elevation regardless of connection state.
Yes. The netsh wlan command syntax is unchanged between Windows 7 and Windows 11. The output format is identical across all versions. Only the GUI navigation path has minor differences between Windows 10 and Windows 11 due to Settings app redesigns, but the Control Panel path remains consistent on both.
Running netsh wlan show profiles in an elevated Command Prompt returns a complete list of all saved WLAN profiles by name. The output groups profiles by interface. From there, each profile name can be queried individually with netsh wlan show profile name="NAME" key=clear to retrieve the stored passphrase.
Yes. Windows retains WLAN profiles indefinitely until manually deleted. The netsh wlan command retrieves credentials from all saved profiles regardless of whether the network is currently detectable. The profile persists locally even if the router is offline, out of range, or no longer exists.
WLAN profiles are stored as XML files in C:\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{adapter-GUID}\. Each interface has its own subdirectory, and each saved network has a corresponding XML file. The key material within those files is DPAPI-encrypted and cannot be read by simply opening the XML without decryption.
No, not from the original machine after reinstall. DPAPI encryption is tied to machine-specific key material stored in the Windows registry. A reinstall destroys that key material. The only recovery path is to retrieve the passphrase before reinstalling, using the methods described above, or to obtain it directly from the router's admin interface.
netsh wlan show profile name="X" key=clear displays human-readable profile details for a single network in the terminal output. netsh wlan export profile key=clear folder="PATH" writes all saved profiles as individual XML files to a specified directory, preserving the full profile configuration including security settings, connection modes, and key material for backup or migration purposes.
No. Windows provides complete native tooling for credential retrieval through the Control Panel GUI, netsh wlan, and PowerShell. Third-party utilities such as WirelessKeyView perform the same underlying API calls and offer no technical advantage over the built-in tools. Our team does not recommend installing additional software for this task.
Every WiFi password on a Windows machine is already recoverable — the only variable is whether the operator knows where to look.
About William Sanders
William Sanders is a former network systems administrator who spent over a decade managing IT infrastructure for a mid-sized logistics company in San Diego before moving into full-time gear writing. His years in IT gave him deep hands-on experience with networking equipment, routers, modems, printers, and scanners — the kind of hardware most reviewers only encounter through spec sheets. He also has a long background in consumer electronics, with a particular focus on home audio and video setups. At PalmGear, he covers networking gear, printers and scanners, audio and video equipment, and tech troubleshooting guides.
You can get FREE Gifts. Or latest Free phones here.
Disable Ad block to reveal all the info. Once done, hit a button below