-
Techniques which decides if a new device can join the normal or a special network. A captive portal forces a client to an authentication page. After authentication in a normal low-security environment (where you cannot assume preconfigured systems) the authentication is usually granted to a combination of MAC and IP. Therefore, try to sniff valid…