IMMUNITY SILICA

Redefining wireless assessments

SILICA 7.27 Release Notes

In this SILICA Release we have ramp up our Client-Side exploitation capabilities, including our most successful CANVAS exploits.

We add Clientside exploitation capabilities to our HTTP traffic on encrypted networks in FakeAP. We include some updates in our post-exploitation capabilities, upgrading our Wifi Key dumper to all windows version.

Enjoy it!

Changelog:

  • Updated embedded Canvas version, including new clientside exploits:

    • adobe_flash_id3 (CVE-2015-5560, targeting Adobe Flash <= 18.0.0.209)
    • adobe_flash_intoverflow_apply (silently patched in Adobe Flash > 17.0.0.169)
    • adobe_flash_domainMemory_uaf (CVE-2015-0313)
    • ms16_006_silverlight
  • Clientside exploits will now also be injected in HTTP traffic when in encrypted FakeAp mode.

  • Wifi key dumper post exploitation module now supports all windows versions and now saves the recovered keys in the "passwords" tab

  • Probe responses are now used to identify hidden SSIDs

  • Bug fixes:

    • issue with channel hopping in the AP Mapping Module
    • issue with Canvas output processing
    • issue with Canvas post-exploitation setting

SILICA VIDEOS

See SILICA in action by watching the latest videos from Vimeo.

VIEW full SILICA Video collection

For product questions or purchase information

please contact us

866-524-4782 *

imu.sales@appgatedotcom

LATEST IN

IMMUNITYMEDIA

TWITTER
VIDEOS