• 8tomat8@lemmy.world
    link
    fedilink
    arrow-up
    18
    ·
    edit-2
    1 year ago

    I always give some bs emails in those authentication forms. Mainly because as a client who tries to connect, I do not have internet access, so I cannot verify my email before they give me the access. And when they gave me access, there is no power in the world to make me do that 🤷

      • Case@unilem.org
        link
        fedilink
        English
        arrow-up
        7
        ·
        edit-2
        1 year ago

        I found a script for bypassing captive portals on Linux back in the day…

        The full functionality of how it works escapes me at the moment, but essentially it searches the network for a host that possibly already connected through the captive portal and spoofs their MAC address.

        This isn’t the one I originally found, but its the same principal and a Kali tool, so it may be considered more secure than the original bash script I copied back in the day:

        https://en.kali.tools/?p=724

        • hitmyspot@aussie.zone
          link
          fedilink
          arrow-up
          2
          ·
          1 year ago

          I used to use an android app that shared log ins for public Wi-Fi even with a password to connwct. It was great as it automated the log in screen too, so was usually seamless.

      • Darkassassin07
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        Android automatically spoofs your MAC for every network and regularly changes it for each one too unless you explicitly disable that after connecting.

        Makes static DHCP leases a PITA.