Skip to main content

How To Backup All Wireless Network Profiles

When you first configure a wireless (Wi-Fi) network at home or work and secure It with a wireless encryption key, Windows will automatically create a profile for that network, that Includes the network name (SSID), security (encryption) key and other relative details. In this tutorial, I will show you how to backup all "wireless network profiles" natively within Windows, and save the Information to your computer's desktop.

Essentially, the profile of  every wireless network that your PC connected to, will be backed up to a .xml file on your computer's desktop, which you can then view via your favorite web browser. This will even backup Inactive wireless networks, that Is, a device that established a connection to a network at any given point In time.

You will be able to view the network name and It's passphrase (encryption key) In plain text. In the event you forget your encryption key or other settings, this will allow you to Instantly connect.

To achieve this, I will be using the good old Command Prompt. So without further delay, let's get this tutorial started.

Step One:
To access the Command Prompt, open the Run menu, enter cmd and hit OK.

Step Two:
Next, copy & paste netsh wlan show profiles, and hit Enter on your keyboard. The user profiles of  your wireless network(s), will now be displayed.

Step Three:
Now copy & paste the following command Into the Command Prompt.
netsh wlan export profile key=clear folder="%UserProfile%\Desktop" 

After hitting the Enter key on your keyboard, a message will be returned confirming that every wireless network profile has been successfully saved to a .xml file on the desktop.

Step Four:
And here's my result. As you can see, all the wireless network profiles have been generated and saved. In total, I have three profiles, hence three files representing each one. Let's checkout my AndroidAP file, which Is my cell phone.

Last Step:
The file has executed In Internet Explorer and as you can see (among other details), the name, authentication type and the passphrase (which I've obviously blurred!), are displayed In plain text. The same type of Information Is contained In my other files, but there's no point In displaying It.

Final Thoughts:
There's a few more bits and pieces of Information contained In the files, but for the purpose of this tutorial, I've only demonstrated the key elements. The upside to this, Is that you can easily save and view the wireless network profiles, past or present. The downside Is, so too can anyone else who has physical access to your wireless network or PC, however not everyone has the know-how to utilize this methodology, so that's huge bonus In your favor.


Popular posts from this blog

How To Decode The Windows 10 Product Key

Every Windows 10 operating system that's Installed and activated on the computer, has what's called a Product Key , that Is either pre-Installed by the manufacturer, or added by the end user when formatting their PC. In order to have a fully-functional OS, It must contain a valid Product Key. Whilst there are many tools that can extract It from the operating system, In this tutorial, I will show you how to manually decode the Product Key.

How To Check Faulty Drivers In Windows 10

For hardware devices to function properly, they must have device drivers  Installed, thus allow them to perform at their optimal state. It's all well and good when they're running without error, but they do tend to fail at the best of times, which can cause system Instability and/or loss of functionality. It can be a difficult task pinpointing the problematic driver(s), so In this tutorial, I will show you how to check faulty drivers , without the aid of third-party tools.

How To Create A Fake File Of Any File Size

Depending on your business environment or Individual requirements, sometimes there Is the need to test files of a given capacity. Such tests can Include Identifying how well your hard disks perform under heavy read/write operations, or to establish whether files can be securely deleted beyond recovery. Whatever the reason may be, In this tutorial, I will show you how to create a fake file of any file size.