laitimes

Three ways to connect encrypted WiFi 1, find the owner to ask for a WiFi password 2, scan the network QR code of the connected mobile phone 3, and summarize with the WiFi master key

Although WiFi networks have two modes of open and encrypted, most people use encrypted WiFi for security. To connect to an encrypted WiF network, you must know the password for the WiFi. If I don't know my password, how do I connect? Here are three ways to help you.

Three ways to connect encrypted WiFi 1, find the owner to ask for a WiFi password 2, scan the network QR code of the connected mobile phone 3, and summarize with the WiFi master key

<h1 class="pgc-h-arrow-right" data-track="3" >1, find the owner to ask for a WiFi password</h1>

Asking the owner for the WiFi password is the most normal way, and it is also the smoothest and safest way. Because you have the permission of the host to connect to the WiFi network, the host will help you solve all the network connection obstacles. Like what:

WiFi password: This is the first threshold for connecting to the network;

Network restrictions: There are many WiFi networks with black and white lists to prevent network rubbing.

Network speed limit: Some units of WiFi network will be most of the connected IP speed limit because of the large number of people.

After the host solves all the problems for you, the network you connect to is the easier to use. Highly recommend this method!

Three ways to connect encrypted WiFi 1, find the owner to ask for a WiFi password 2, scan the network QR code of the connected mobile phone 3, and summarize with the WiFi master key

<h1 class="pgc-h-arrow-right" data-track="3" >2, scan the network QR code of the connected mobile phone</h1>

If the host happens to be around, it is not possible to ask for the WiFi password. At this time, you can take the second method: find a friend who is already connected to the WiFi network next to you. Ask them to show the QR code that has been connected to the WiFi network, and you can scan the code to see the password of the network. Here's how:

A mobile phone: Click on the "Settings&gt;WLAN" option in turn, find the WiFi network that has been connected, and click on it to open the QR code of the network.

B mobile phone: open WeChat to scan, aim at the two-dimensional code to scan the code. The phone automatically displays the SSID and password for that network.

With the password, you can smoothly connect to the WiFi network. However, compared to the first method, it is not possible to remove network limits and network speed limits.

Three ways to connect encrypted WiFi 1, find the owner to ask for a WiFi password 2, scan the network QR code of the connected mobile phone 3, and summarize with the WiFi master key

<h1 class="pgc-h-arrow-right" data-track="3" >3</h1>

If the prerequisites of the above two methods cannot be met, they are eager to go online. That can be used with WiFi Master Key software to crack the password of the encrypted WiFi network. The operation method is very simple, open the WiFi Master Key APP and click on the switch in the upper right corner. It will automatically scan the surrounding WiFi network, and if it can be cracked, there will be an icon with a key on the right side of the network icon. Click on the network and the software will automatically network to get the password and connect to the network.

It is worth noting that this method is a very insecure net rubbing behavior, not 100% successful. And when you install and use the app, the Password for the WiFi network that your phone has connected to may be shared (including the WiFi network in your home). Yes, in general, this approach is not recommended.

Three ways to connect encrypted WiFi 1, find the owner to ask for a WiFi password 2, scan the network QR code of the connected mobile phone 3, and summarize with the WiFi master key

<h1 class="pgc-h-arrow-right" data-track="3" > summary</h1>

These are three ways to connect to an encrypted WiFi network. It is recommended to use the first method of formal safety first, followed by the second method. A third approach is strongly discouraged unless it is a last resort.