ISAC Cambodia (InfoSec)


Description: Welcome to Part 10 of the WLAN Security Megaprimer! Please start this series by watching Part 1, if you have not done so already.

In this video, we will look at how to compromise isolated wireless clients. Most operating systems have utilities which will cache the SSID and security credentials (if applicable) and use it the next time the network is available in the vicinity. This is a major security problem. A hacker could very easily setup a tool which monitors the air for Probe Request packets. Once a Probe Request packet is seen over the air, the tool automatically responds to it and establishes a communication with the client. This now gives the hacker IP level access to it. From here on, he can run tools like Metasploit to break into the computer.

Show More
Apsara Media Services (AMS)


Mr. OU Phannarith is one of the well-known cybersecurity experts in Cambodia and the region. He is the founder of the first leading information security website ( in Cambodia. He has been invited to present in global conferences, forums, and seminars and he was awarded in Information Security Leadership Achievements (ISLA) in 2016 by (ISC)2 and in December 2012 as one of the top 10 Chief Information Security Officers (CISO) in ASEAN by the International Data Group (IDG). Mr. OU has been the Professor specializing in Cybersecurity.

Related Articles

Check Also
Back to top button