Redefining wireless assessments
STALKER mode to force redirection and collecting more data
Fake Access Point and Ad-Hoc supports radius like credential capturing for attacking WPA1,2 and WEP enterprise configured networks (PEAP, LEAP)
Fake Access point and Ad-Hoc mode with phishing attack capabilities:
Capture HTTP usernames and passwords for: . Facebook and Facebook Mobile . Twitter . Gmail (does not work against Google-Chrome)
Easter-egg for Pandora mobile Apps (iphone and android maybe more!)
New VMware image with an improved wireless driver. Please note the old VMware image will still be supported but updates for it will be discontinued as of the next SILICA release. Contact firstname.lastname@example.org to receive an updated version.
Intelligent difficulty factor of attacking a network in the form of a color next to the network name
New clientd exploit for Java forName/getField Method Invocation Sandbox Bypass (CVE-2012-4681)
New option to allow wireshark sniffing on a particular channel
Update WPA cracking C module with more statistics about progress and ETA
See SILICA in action by watching the latest videos from Vimeo.
* Business Hours: Mon-Fri | 9am-5pm (EST)