Chapter 3. Bypassing WLAN Authentication
Note
"A false sense of security is worse than being unsure."
Anonymous
A false sense of security is worse than being insecure, as you may not be prepared to face the eventuality of being hacked.
WLANs have weak authentication schemas, which can be easily broken and bypassed. In this chapter, we will look at the various authentication schemas used in WLANs and learn how to beat them.
In this chapter, we will look at the following:
Uncovering hidden SSIDs
Beating MAC filters
Bypassing Open Authentication
Bypassing Shared Key Authentication