Time for action – beating MAC filters
Let's follow the instructions to get started:
Let's first configure our access point to use MAC filtering and then add the client MAC address of the victim laptop. The settings pages on my router looks as follows:

Once MAC filtering is enabled, only the allowed MAC address will be able to successfully authenticate with the access point. If we try to connect to the access point from a machine with a non-whitelisted MAC address, the connection will fail.
Behind the scenes, the access point is sending Authentication failure messages to the client. The packet trace resembles the following:

In order to beat MAC filters, we can use
airodump-ngto find the MAC addresses of clients connected to the access point. We can do this by issuing theairodump-ng -c 11 -a --bssid <mac> mon0command. By specifying thebssidcommand, we will only monitor the access point, which is of interest to us. The-c 11command sets the channel to11where the access point is. The...