Phase four – performing a fake authentication