In Part 3, we will understand the basics of Beacon frames and how access points use it to advertise their presence to clients in the same RF vicinity. We will whip out Wireshark and understand these packets down to a microscopic detail. Then, we will also look at how to use MDK3 in BT4 to create a Beacon frame flood to fool all the wireless clients in the vicinity.
Mr. OU Phannarith is one of the well-known cybersecurity experts in Cambodia and the region. He is the founder of the first leading information security website (www.secudemy.com) in Cambodia. He has been invited to present in global conferences, forums, and seminars and he was awarded in Information Security Leadership Achievements (ISLA) in 2016 by (ISC)2 and in December 2012 as one of the top 10 Chief Information Security Officers (CISO) in ASEAN by the International Data Group (IDG). Mr. OU has been the Professor specializing in Cybersecurity.
March 4, 2014
January 3, 2013
February 4, 2014