CIP Cyber

WifiInfoView: WiFi Scanner for Windows OS

Table of Contents

WifiInfoView scans the wireless networks in your area and displays extensive information about them, including: Network Name (SSID), MAC Address, PHY Type (802.11g or 802.11n), RSSI, Signal Quality, Frequency, Channel Number, Maximum Speed, Company Name, Router Model and Router Name (Only for routers that provides this information), and more…

When you select a wireless network in the upper pane of this tool, the lower pane displays the Wi-Fi information elements received from this device, in hexadecimal format.

WifiInfoView also has a summary mode, which displays a summary of all detected wireless networks, grouped by channel number, company that manufactured the router, PHY type, or the maximum speed.

System Requirements

  • Operating System: This utility works on Windows Vista, Windows 7, Windows 8, and Windows Server 2008.
    Both 32-bit and x64 systems are supported.

    Windows XP is not supported because this tool is based on new Wi-Fi API that doesn’t exist on Windows XP.
    If you want to get wireless networks information on Windows XP, you can use the WirelessNetView utility.

  • Wireless network adapter and wireless card driver that works with the built-in wireless support of Windows Vista/7/8/2008. 

Start Using WifiInfoView

WifiInfoView doesn’t require any installation process or additional dll files. In order to start using it,
simply run the executable file – WifiInfoView.exe

After you run WifiInfoView, the list of detected wireless networks in
your area is displayed on the upper pane and it’s updated at
very high rate. You can change update rate from Options->Update Rate
menu.

When you select one or more wireless networks in the upper pane, the lower pane displays the Wi-Fi information elements
of the selected items, in hexadecimal format.

Columns In the Upper Pane

  • SSID: The name of the network.
  • MAC Address: MAC address of the router.
  • PHY Type: The PHY type for this network – 802.11a, 802.11g, 802.11n, or High-Rate DSSS
  • RSSI: The received signal
    strength indicator value, in units of decibels referenced to 1.0
    milliwatts (dBm), as detected by the wireless LAN interface driver for
    the AP or peer station.
  • Signal Quality: A number between 0 and 100 that represents the quality of the signal.
  • Frequency: The channel center
    frequency of the band on which the 802.11 Beacon or Probe Response frame
    was received. The value of this column is in units of Gigahertz (GHz).
  • Channel: Channel number used by this wireless network.
  • Information Size:The total size (in bytes) of all Wi-Fi information elements received from this wireless network.
  • Elements Count: The total number of Wi-Fi information elements received from this wireless network.
  • Company: The company that manufactured the router, according to the 3 first bytes of the MAC address.
  • Router Model: The model of the
    router. This value is displayed only for routers that provide this
    information inside the Wi-Fi information elements.
  • Router Name: The name of the
    router. This value is displayed only for routers that provide this
    information inside the Wi-Fi information elements.
  • Security: Specifies whether the network is secured (Yes/No).
  • Maximum Speed: The maximum speed (in Mbps) that you can get when connecting to this wireless network.
  • First Detection: The first date/time that this network was detected.
  • Last Detection: The last date/time that this network was detected.
  • Detection Count: The number of times that this network was detected.

Download and learn more at:

CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Do Hackers Really use Metasploit? NO!

Undoubtedly, Metasploit is one of the most organized, well-developed tools in the pen-testers toolbox. But, do hackers use it? Some of them, but not the

Sunset: Dusk VM walkthrough

Sunset: dusk is a vulnerable by design Debian based machine created by whitecrOwz. It is available on https://www.vulnhub.com This machine is ranked as a beginner

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings