Not infrequently the captive portal built on a hotshot has a weakness in the network configuration or design. For example, still uses plain text authentication (HTTP), network management can be accessed via the wireless (located on a network), and many more.