Redefining wireless assessments
Client side exploit for Java AtomicReferenceArray Type Confusion Sandbox Bypass (CVE-2012-0507). This is handled automatically by SILICA's Man-In-The-Middle, Fake-AP and custom injection modules.
Browser auto-complete vulnerability, get any saved passwords the browser has saved automatically
Custom injection template support for popular sites such as twitter, facebook, gmail, linkedin, pandora
See SILICA in action by watching the latest videos from Vimeo.
* Business Hours: Mon-Fri | 9am-5pm (EST)