IMMUNITY SILICA

Redefining wireless assessments

SILICA 7.37 Release Notes
  • Neighborhood Graph Visualization: This new visualization allows the user to view a graph of related networks, Access Points, SSIDs, and client devices for a given wireless device. This graph can be useful for looking for rogue access points, or for figuring out how to attack an access point by attacking its stations.

  • DHCP client Command Injection Exploit (CVE-2018-1111): This module exploits a command injection flaw in the Network Manager script included in the DHCP client packages in Red Hat Enterprise Linux. This module will try to exploit the vulnerability in devices that join SILICA's Fake AP.

  • Improved KRACK attack detection: SILICA will passively sniff for encrypted WPA traffic and try to decrypt it using an all-zero key. If the decryption succeeds, the BSSID of the encrypted traffic will be shown in red in the Malicious Access Point Detection tab.

  • Updated OUI database.

SILICA VIDEOS

See SILICA in action by watching the latest videos from Vimeo.

VIEW full SILICA Video collection

For product questions or purchase information

please contact us

786-220-0600 *

sales@immunityincdotcom

* Business Hours: Mon-Fri | 9am-5pm (EST)

LATEST IN

IMMUNITYMEDIA

TWITTER
VIDEOS
PRODUCT
BLOG
SERVICES
BLOG