Bypassing Authenticated Wireless Networks (Explained)