Quote: Originally Posted by rbeldua
try these folders from your windows.old, the encrypted password is stored in a credential file.
- Windows XP/2003: [Windows Profile]\Application Data\Microsoft\Credentials\[User SID]\Credentials and [Windows Profile]\Local Settings\Application Data\Microsoft\Credentials\[User SID]\Credentials
- Windows Vista\7: [Windows Profile]\AppData\Roaming\Microsoft\Credentials\[Random ID] and [Windows Profile]\AppData\Local\Microsoft\Credentials\[Random ID]
like shootist said.. it is enrcypted, only way you can use those keys it to brute force it.
Readable keys are on the router. So if one clean installs and has not noted down the key, one would just login into the router and copy the key from the config pages.
However, I just did some reasearch into wirelesskeyview that the OP is using. Apparently this tool reads keys stored in the filesystem under c:\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\[Interface Guid]. The [Interface Guid] is a unique GUID value that represents your wireless network card. The keys are stored and well-encrypted inside the .xml files that you can find in the above path.
To test, I checked on my own computer and indeed theres an xml file in that location. Running wirelesskeyview revealed the key in both hex and plain text. I backed the xml to another drive then deleted it from the default location. After that wirelesskeyview failed to display any key.
So heres something the OP can try. In windows.old, locate the xml files as described above, then copy and paste them into the default location wirelesskeyview uses (remember to unhide hidden and protected OS files and folders first). Then run wirelesskeyview.