IMMUNITY SILICA

Redefining wireless assessments

SILICA 7.21 Release Notes
  • WPS offline bruteforcing (AKA Pixie Dust Attack)

    • Access Points using Ralink chipsets lack randomization of the E-S1 and E-S2 nonces. This attack will do an offline brute force of the WPS PIN, reducing the time that it usually take to obtain the Access Point credentials.
  • New WPS option "try only default PINs"

    • When this menu option is selected, only the fastest WPS attacks are carried on.
  • Denial of service enhancement

    • The "Disable this network" module will now send a continuous stream of deauthentication packets.
  • Bug Fixes:

    • Issue that prevented connection to some WLANs using WPA encryption.
    • Issue with the WPS bruteforcing module.
    • Wireless channel selection fixes.

Demo: Pixie Dust WPS Attack

SILICA VIDEOS

See SILICA in action by watching the latest videos from Vimeo.

VIEW full SILICA Video collection

For product questions or purchase information

please contact us

786-220-0600 *

sales@immunityincdotcom

* Business Hours: Mon-Fri | 9am-5pm (EST)

LATEST IN

IMMUNITYMEDIA

TWITTER
VIDEOS
PRODUCT
BLOG
SERVICES
BLOG