In this video, we will understand how AP and Client actually negotiate and establish a connection using – Probe Requests, Probe Responses, Authentication Requests, Authentication Responses, Association Request and Association Responses. We will learn all this using Wireshark and watching a live connection happen over the air. This video will form our base to look at attacks such as authentication bypass.
Mr. OU Phannarith is one of the well-known cybersecurity experts in Cambodia and the region. He is the founder of the first leading information security website (www.secudemy.com) in Cambodia. He has been invited to present in global conferences, forums, and seminars and he was awarded in Information Security Leadership Achievements (ISLA) in 2016 by (ISC)2 and in December 2012 as one of the top 10 Chief Information Security Officers (CISO) in ASEAN by the International Data Group (IDG). Mr. OU has been the Professor specializing in Cybersecurity.
December 31, 2013
July 9, 2014
February 4, 2014
The enemy on your phone: evolution of mobile threatsFebruary 25, 2015