O'Reilly logo

BackTrack 5 Wireless Penetration Testing Beginner’s Guide by Vivek Ramachandran

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Time for action beating MAC filters

Let the games begin:

  1. Let us first configure our access point to use MAC filtering and then add the client MAC address of the victim laptop. The settings pages on my router look as follows:
    Time for action beating MAC filters
  2. Once MAC filtering is enabled only the allowed MAC address will be able to successfully authenticate with the access point. If we try to connect to the access point from a machine with a non-whitelisted MAC address, the connection will fail as shown next:
    Time for action beating MAC filters
  3. Behind the scenes, the access point is sending Authentication failure messages ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required