This new visualization allows the user to view a graph of related networks, Access Points, SSIDs, and client devices for a given wireless device. This graph can be useful for looking for rogue access points, or for figuring out how to attack an access point by attacking its stations.
This module exploits a command injection flaw in the Network Manager script included in the DHCP client packages in Red Hat Enterprise Linux. This module will try to exploit the vulnerability in devices that join SILICA's Fake AP.
SILICA will passively sniff for encrypted WPA traffic and try to decrypt it using an all-zero key. If the decryption succeeds, the BSSID of the encrypted traffic will be shown in red in the Malicious Access Point Detection tab.
See SILICA in action by watching the latest videos from Vimeo.
866-524-4782 *
imu.sales@appgatedotcom