IMMUNITY SILICA

Redefining wireless assessments

SILICA 7.9 Release Notes
  • Client side exploit for Java AtomicReferenceArray Type Confusion Sandbox Bypass (CVE-2012-0507). This is handled automatically by SILICA's Man-In-The-Middle, Fake-AP and custom injection modules.

  • Browser auto-complete vulnerability, get any saved passwords the browser has saved automatically

  • Custom injection template support for popular sites such as twitter, facebook, gmail, linkedin, pandora

  • Interface

    • New column showing information from Cisco access points such as the connected clients and the name
    • Info tab storing all passwords SILICA has automatically retrieved during an attack (i.e. browser auto-complete)
    • New column showing the activity of APs and clients

SILICA VIDEOS

See SILICA in action by watching the latest videos from Vimeo.

VIEW full SILICA Video collection

For product questions or purchase information

please contact us

786-220-0600 *

sales@immunityincdotcom

* Business Hours: Mon-Fri | 9am-5pm (EST)

LATEST IN

IMMUNITYMEDIA

TWITTER
VIDEOS
PRODUCT
BLOG
SERVICES
BLOG