Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By : Cameron Buchanan
Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By: Cameron Buchanan

Overview of this book

Table of Contents (19 chapters)
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Disclaimer
Preface
Index

Time for action – bypassing Open Authentication


Let's now take a look at how to bypass Open Authentication:

  1. We will first set our lab access point Wireless Lab to use Open Authentication. On my access point, this is simply done by setting Security Mode to Disable Security:

  2. We then connect to this access point using the iwconfig wlan0 essid Wireless Lab command and verify that the connection has succeeded and that we are connected to the access point.

  3. Note that we did not have to supply any username/password/passphrase to get through Open Authentication.

What just happened?

This is probably the simplest exercise so far. As you saw, there is no barrier to connecting to an Open Authentication network and connecting to the access point.