The FakeAp karma option now implements the attack known as "mana": build a per-mac view of the proximate network list, and respond to broadcast probes with direct responses for each proximate network list. This allows to attract more client devices than the previous karma attack.
When trying to connect to a network using 802.1X authentication, SILICA will now launch an EAP Relay Attack if the credentials are unknown. This attack will allow SILICA to join the network after a man-in-the-middle attack on a legitimate client device trying to join the network.
Two wireless cards are needed for this attack, and this attack only works on PEAP-EAP-MSCHAPv2 at this time.
See SILICA in action by watching the latest videos from Vimeo.
866-524-4782 *
imu.sales@appgatedotcom