Skip to content

T1016.002 Wi-Fi Discovery

Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems. Adversaries may use Wi-Fi information as part of Account Discovery, Remote System Discovery, and other discovery or Credential Access activity to support both ongoing and future campaigns.

Adversaries may collect various types of information about Wi-Fi networks from hosts. For example, on Windows names and passwords of all Wi-Fi networks a device has previously connected to may be available through netsh wlan show profiles to enumerate Wi-Fi names and then netsh wlan show profile “Wi-Fi name” key=clear to show a Wi-Fi network’s corresponding password.642 Additionally, names and other details of locally reachable Wi-Fi networks can be discovered using calls to wlanAPI.dll Native API functions.1

On Linux, names and passwords of all Wi-Fi-networks a device has previously connected to may be available in files under /etc/NetworkManager/system-connections/.3 On macOS, the password of a known Wi-Fi may be identified with security find-generic-password -wa wifiname (requires admin username/password).5

Item Value
ID T1016.002
Sub-techniques T1016.001, T1016.002
Tactics TA0007
Platforms Linux, Windows, macOS
Version 1.1
Created 08 September 2023
Last Modified 24 October 2025

Procedure Examples

ID Name Description
S0331 Agent Tesla Agent Tesla can collect names and passwords of all Wi-Fi networks to which a device has previously connected.9
C0051 APT28 Nearest Neighbor Campaign During APT28 Nearest Neighbor Campaign, APT28 collected information on wireless interfaces within range of a compromised system.10
S0674 CharmPower CharmPower can use netsh wlan show profiles to list specific Wi-Fi profile details.2
S0367 Emotet Emotet can extract names of all locally reachable Wi-Fi networks and then perform a brute-force attack to spread to new networks.1
S0409 Machete Machete uses the netsh wlan show networks mode=bssid and netsh wlan show interfaces commands to list all nearby WiFi networks and connected interfaces.8
G0059 Magic Hound Magic Hound has collected names and passwords of all Wi-Fi networks to which a device has previously connected.2
S1228 PUBLOAD PUBLOAD has collected information on Wi-Fi networks from victim hosts leveraging netsh wlan show profiles, netsh wlan show interface, and netsh wlan show. 7

References