• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.
  • The forums have been upgraded with support for dark mode. By default it will follow the setting on your system/browser. You may override it by scrolling to the end of the page and clicking the gears icon.

W10H cannot connect to hidden network

Joined
Aug 29, 2005
Messages
7,524 (1.04/day)
Location
Stuck somewhere in the 80's Jpop era....
System Name Lynni PS \ Lenowo TwinkPad L14 G2
Processor AMD Ryzen 7 7700 Raphael \ i5-1135G7 Tiger Lake-U
Motherboard ASRock B650M PG Riptide Bios v. 3.10 AMD AGESA 1.2.0.2a \ Lenowo BDPLANAR Bios 1.68
Cooling AMD Wraith Cooler \ Lenowo C-267C-2
Memory G.Skill Flare X5 2x16GB DDR5 6000MHZ CL36-36-36-96 AMD EXPO \ Willk Elektronik 2x16GB 2666MHZ CL17
Video Card(s) Sapphire PURE AMD Radeon™ RX 9070 Gaming OC 16GB | Intel® Iris® Xe Graphics
Storage Gigabyte M30 1TB|Sabrent Rocket 2TB| HDD: 10TB|1TB \ WD RED SN700 1TB
Display(s) KTC M27T20S 1440p@165Hz | LG 48CX OLED 4K HDR | Innolux 14" 1080p
Case Asus Prime AP201 White Mesh | Lenowo L14 G2 chassis
Audio Device(s) Steelseries Arctis Pro Wireless
Power Supply Be Quiet! Pure Power 12 M 750W Goldie | Cyberpunk GaN 65W USB-C charger
Mouse Logitech G305 Lightspeedy Wireless | Lenowo TouchPad & Logitech G305
Keyboard Ducky One 3 Daybreak Fullsize | L14 G2 UK Lumi
Software Win11 IoT Enterprise 24H2 UK | Win11 IoT Enterprise LTSC 24H2 UK / Arch (Fan)
Benchmark Scores 3DMARK: https://www.3dmark.com/3dm/89434432? GPU-Z: https://www.techpowerup.com/gpuz/details/v3zbr
Last night when I couldn't sleep I started playing around with hidden the SSID in my Asus RT-AC66U router running Merlin's firmware.

My Intel ComputeStick with Intel Wireless-AC 7265 couldn't connect when the SSID is hidden even with manual input it just says connecting nuth happens, but if I take my iPhone 7 Plus add it manually it connects just fine.

So is this a Windows 10 issue?

I hope that someone knows how I can fix this? my ComputeStick is running Windows 10 Home 32bit with Anniversary Update.

Specs of my ComputeStick: http://ark.intel.com/products/91065/Intel-Compute-Stick-STK1AW32SC
 
Last night when I couldn't sleep I started playing around with hidden the SSID in my Asus RT-AC66U router running Merlin's firmware.

My Intel ComputeStick with Intel Wireless-AC 7265 couldn't connect when the SSID is hidden even with manual input it just says connecting nuth happens, but if I take my iPhone 7 Plus add it manually it connects just fine.

So is this a Windows 10 issue?

I hope that someone knows how I can fix this? my ComputeStick is running Windows 10 Home 32bit with Anniversary Update.

Specs of my ComputeStick: http://ark.intel.com/products/91065/Intel-Compute-Stick-STK1AW32SC

Do you have the current 380. 63?

Also when the network is not hidden I'm assuming the device in question can connect fine?
 
Do you have the current 380. 63?

Also when the network is not hidden I'm assuming the device in question can connect fine?

nope running 380.62 didn't knew there were a 380.63 I will update later properly

yeh when the network is visible it connects just fine.
 
I've had no issues connecting to a hidden SSID before, I would assume it is a driver or entry issue. SSID must be EXACTLY as it would be broadcasted, or you will not connect. Sounds like you have that sorted already with your iPhone though.

Have you tried this solution for adding a hidden network to Windows 10?

Seems pretty odd, not much out there..one MS article states to try older WiFi drivers and for some reason to install updated keyboard drivers (LOL). I'd try the 380.63 driver as you said you haven't yet and report back when you can.

I just checked with my work laptop, a Lenovo Carbon X1 2016, and it connects to Win 10 hidden SSID's just fine... 2.4 and 5.0GHz networks, N and AC. I have an Intel AC-8620 though...

:toast:
 
Aside from updating to either the new merlin, or back to stock Asus, im out of idea.....aside from simple stuff..... I had a problem with logging into my router once. It would only happen with A single device & none of the others, it ended up being the tablet would always automatically capitalize the first letter when entering into a text box and I had never noticed it .....I almost threw that damn tablet right out my window
 
I would suggest simply not worrying about it, for a number of reasons.

1. Hiding your SSID won't grant you any security anyway. Anyone who wants in can find your SSID anyway.
2. It makes it more difficult to connect, even when it does work.
3. Some devices, for some reason, just don't like hidden SSIDs and have trouble with it.

Just not worth it.
 
@puma99dk|

We have exactly the same routers you and i.

I have attempted to enable hidden networks in the past, just cause I was screwing around with the settings and if I remember correctly I gave up long before resolving the issue

And the wireless device I was using was one of netgears top-of-the-line wireless adapters
 
I would suggest simply not worrying about it, for a number of reasons.

1. Hiding your SSID won't grant you any security anyway. Anyone who wants in can find your SSID anyway.
2. It makes it more difficult to connect, even when it does work.
3. Some devices, for some reason, just don't like hidden SSIDs and have trouble with it.

Just not worth it.

I have to give some of my opinions on your opinions here, just my 2 cents. ;)

1. True the SSID is still broadcast, it is far less frequently and someone will need to be more patient or purposely performing signal capture to attempt to validate the SSID in question. For most cases this is a great way to increase wireless security period as many folks won't get harassed by those looking for easy to access wifi...odds are if you have your SSID hidden, you're using WPA2 + AES already...the triple combo makes the wireless network that much less likely to be compromised.
2. That's the whole point of hiding an SSID in the first place...if it were easy everyone would do it and it wouldn't be considered an optional security measure...
3. This is true...some devices have issues with this..usually attributed to shitty implementations of hardware/drivers. Sometimes it is OS-related as well...one could try Linux as a LiveUSB or a different version of Windows...but really anything modern shouldn't really have issues. I see more issues with Apple devices and hidden SSID's than anything else...in-fact I see more issues with Apple devices and wireless networks than any other brand out there. It is ironic that the OP has the reverse issue here...an issue with Intel devices connecting to the hidden SSID but not i-Devices.

I have an Asus AC66R as well, but mine is in AP mode...I do have a hidden SSID configuration I do use mostly for my lab..then I have a family wifi that is broadcast and a guest wifi that is broadcast. Frankly I am happy with the AC66R, but can't wait to get an Ubiqutiy UniFi AC Pro ($) or Ruckus R500/600 ($$$) for more advanced wireless network management features and capabilities and range. That day may never come, at least unless I pick up something used that is a true upgrade from the Asus which has been a very reliable unit for over 2.5yrs now.

One thing most folks forget is the hidden SSID must be typed out exactly as it is broadcasted...caps, underscores, etc... if you miss one aspect of that, you won't connect.

Back on security I mentioned before, WPA2 + AES is a pretty solid wireless security standard, especially when a secure password is used. It is best to use a password generator that will blend a little bit of everything. Using a strong password, plus WPA2, plus AES encryption, you're going to have a pretty damn strong setup that someone will have to really want to work at to get into. If you have a weak password to keep it "easy", then you might as well use open authentication...well that's not necessarily true...but if it is easy to remember, there might be a chance it is easy to guess as well.

Beyond that, hoping that the OP got the issue sorted! :toast:
 
I have to give some of my opinions on your opinions here, just my 2 cents. ;)

1. True the SSID is still broadcast, it is far less frequently and someone will need to be more patient or purposely performing signal capture to attempt to validate the SSID in question. For most cases this is a great way to increase wireless security period as many folks won't get harassed by those looking for easy to access wifi...odds are if you have your SSID hidden, you're using WPA2 + AES already...the triple combo makes the wireless network that much less likely to be compromised.
2. That's the whole point of hiding an SSID in the first place...if it were easy everyone would do it and it wouldn't be considered an optional security measure...
3. This is true...some devices have issues with this..usually attributed to shitty implementations of hardware/drivers. Sometimes it is OS-related as well...one could try Linux as a LiveUSB or a different version of Windows...but really anything modern shouldn't really have issues. I see more issues with Apple devices and hidden SSID's than anything else...in-fact I see more issues with Apple devices and wireless networks than any other brand out there. It is ironic that the OP has the reverse issue here...an issue with Intel devices connecting to the hidden SSID but not i-Devices.

Haha, well allow me to give my opinions on your opinions of my opinions :laugh:

1. The point here, though, is if someone really wants access to your network, a hidden SSID will not stop them. WPA2/AES most likely will, if you don't use a shit password and you're not being attacked by ultraleet hackers. Hiding your SSID for security when you have WPA2/AES is like hiring Steve Urkel as an additional bodyguard when you already have Mike Tyson as your bodyguard. The same is true for wireless MAC address filtering. It's easily defeated by anyone who gives half a hoot about getting into your network, but those same people will most likely be stopped by WPA2/AES anyway.

2. Yeah, it makes it harder to connect. Harder for you, the master of your own network, that is. Is it harder for a hacker attempting to access your network? Not really... again, same story with MAC address filtering, which just like hiding the SSID has been time and time again recommended against doing because all it amounts to in reality is making it a chore for you to access your own network. The hacker? Not so much.

3. While this issue may come down to shitty hardware or drivers (which I'm not defending), the issue still exists. Why make it harder, or even impossible (due to devices with shitty hardware/software) to access your own network, when the benefits just aren't there? It absolutely makes it more difficult for you to access your own network, but if your network is under attack, a hidden SSID will stop nobody who cares enough to access your secure network in the first place.

And then there's the issue at hand: security. Who really cares about your network? Or mine? I'll give you the benefit of the doubt and acknowledge the possibility that you might be somebody who has valuable data on your network, data that somebody could possibly have a reason to go chasing after it... or some other reason you legitimately need a strong, secure network. However, 99% of users need only to secure their network enough to stop weirdos from leeching their internet to download porn while sending dicks to their network printer. WPA2/AES is more than sufficient for this. Now, when it comes to real tough security, the kind of security needed to stop attackers with a reason for attacking a secure network, I admit my knowledge isn't great here... but, as far as I know anyway, WPA2/AES is still the best you could hope for, and hiding SSIDs won't save you from someone who can break WPA2/AES. That's like throwing a tarp over a bank vault and hoping the guy who knows how to break into the vault won't be able to tell it's under that conspicuous tarp... :laugh:
 
Haha, well allow me to give my opinions on your opinions of my opinions :laugh:
:toast: Well then, by all means let me share my opinions of your opinions of my opinions of your opinions...err..wut? LOL!

1. Agreed, but your original statement is still arguable on the fact you state it provides no security when it in-fact does, even if it's very minor in comparison to a secure password, WPA2 and AES encryption as we both seem to agree on. Not that hiding an SSID is a necessary or common step for many, it's used for more often than I expected out in the field TBH...and unless you really want to look for pings for the hidden SSID's it's not really worth your time but as you said it's not really going to stop anyone that is motivated. ;P

2. Not really, type in the right SSID and be done with it 95% of the time...unless you have the OP's luck or older iDevices...at least in my experience with them.

MAC address filtering is an entirely different aspect to even bring into this conversation...moreso on the fact that if the hacker doesn't know what MAC address to spoof, he isn't gonna get in...but if he's already captured the packets to ID the MAC address odds are the wireless network was secured with WPA2/AES in the first place...or the dude was really good and extremely patient. Anyone can MAC spoof..hell Windows 10 has a feature for it! I shit you not. And maybe you are already aware of it, but for those that aren't...it might be worth knowing if your MAC address is ever blocked and the security guy doesn't run a whitelist side-by-side with the blacklist.

3. True, but really what attacks are experienced more? A WAN-side DoS attack or a WiFi attack? At least in my region it is clearly the WAN-side attacks and port scans. Not nearly as much wireless attacks...but they do happen. Found a couple of rouge AP's recently and that was good fun! While I do agree that hardware conflicts to make it harder, most of the time connecting to a hidden SSID in my experience is really a non-issue. Hidden SSID's have uses beyond border security too...keeping workers off the internal WLAN is a good one..where a preconfigured GPO fires out wireless network settings so that the workstation can connect, but the user is blocked from accessing the WLAN SSID/NIC configs, keeps them from adding unwanted devices. How does that affect the home user? Well in a similar fashion as I use it, to have my own WLAN that noone else has access to unless I want them to...that is VLAN'd and used mostly for lab work and testing. Sure could someone break into it? Ya I am sure eventually but with my passwords it'll be one helluva good fight that'll probably sway them to move on. There are some uses for hidden SSID's, mostly in the name of keeping others out that might not necessarily be hacker-grade or even network engineer/tech-grade material...and even those that are more-so that even if they find the SSID, they still have to try to break the encryption or brute force in...have fun! ;)

And then there's the issue at hand: security. Who really cares about your network? Or mine? I'll give you the benefit of the doubt and acknowledge the possibility that you might be somebody who has valuable data on your network, data that somebody could possibly have a reason to go chasing after it... or some other reason you legitimately need a strong, secure network. However, 99% of users need only to secure their network enough to stop weirdos from leeching their internet to download porn while sending dicks to their network printer. WPA2/AES is more than sufficient for this. Now, when it comes to real tough security, the kind of security needed to stop attackers with a reason for attacking a secure network, I admit my knowledge isn't great here... but, as far as I know anyway, WPA2/AES is still the best you could hope for, and hiding SSIDs won't save you from someone who can break WPA2/AES. That's like throwing a tarp over a bank vault and hoping the guy who knows how to break into the vault won't be able to tell it's under that conspicuous tarp... :laugh:

I absolutely agree...the real issue is who really gives a flying fuck about our private networks unless we have something to offer. Are we worth the risk of detection? Is it just a game to see if they can get in? I already clearly stated I'll deal with the WAN side jokers far more than those whom take an interest in WLAN breaking and entering.

99% of users should be using WPA2/AES and a strong password...a weak password on WPA2/AES is still better than a weak password without WPA2/AES...but the risk is still factors greater than a strong password.

WPA2 Enterprise with RADIUS or centralized account management database with privilege/access control is the next step up from WPA2/AES, most home users won't utilize this as you need a central database for user accounts and control, in many cases Active Directory and Domain Services. There's plenty of risks with that method as well, but there's also more to add, port security, VLANs for different groups, various subnets and routes for different SSIDs, isolation if needed (this is really handy for guest networks for obvious reasons), and MAC blacklist/whitelisting all play a critical role depending on the level of security needed...half-assing any step is like leaving the main door open with the dead bolt out though...the storm door won't be able to shut because the security was setup wrong...

I do like your analogy of the bank robber w/tarp and hidden SSID, and you do have a point in that respect...but there's still a use and need for hiding SSID's out there, but it shouldn't be the expected mainstay for wireless security, but rather just one extra step someone would have to take to access the network or to break into the network.

:toast:
 
I updated my routers firmware yesterday and but didn't get around to play with my ComputeStick mby when I get home today I will have some time.
 
Back
Top