Redefining wireless assessments
New VPN module for fake services under fake AP. This module will impersonate a VPN PPTP server and answer the authentication request by any client. Once the request is captured the username and the challenge/response will be saved in the Reports directory and shown in the information tab under passwords. The attack has been tested with the native OS integrated software in the following platforms:
Added exploit for MBeanInstantiator.findClass Remote Code Execution (CVE-2013-0422) in MITM and Injection modules
Added support for reading PKI (airpcap, kismet etc.) PCAPs
See SILICA in action by watching the latest videos from Vimeo.
* Business Hours: Mon-Fri | 9am-5pm (EST)