Chapter 3 Bypassing WLAN Authentication