Redefining wireless assessments
Neighborhood Graph Visualization: This new visualization allows the user to view a graph of related networks, Access Points, SSIDs, and client devices for a given wireless device. This graph can be useful for looking for rogue access points, or for figuring out how to attack an access point by attacking its stations.
DHCP client Command Injection Exploit (CVE-2018-1111): This module exploits a command injection flaw in the Network Manager script included in the DHCP client packages in Red Hat Enterprise Linux. This module will try to exploit the vulnerability in devices that join SILICA's Fake AP.
Improved KRACK attack detection: SILICA will passively sniff for encrypted WPA traffic and try to decrypt it using an all-zero key. If the decryption succeeds, the BSSID of the encrypted traffic will be shown in red in the Malicious Access Point Detection tab.
Updated OUI database.
See SILICA in action by watching the latest videos from Vimeo.
* Business Hours: Mon-Fri | 9am-5pm (EST)