A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. SILICA will try to exploit this vulnerability to spoof SSL certificates with the "FakeAP with service impersonation" module.
Several NETGEAR routers have a telnet daemon that can be enabled remotely and accessed with default credentials. SILICA will try to exploit this vulnerability with the "Attack" module and use it to obtain credentials for the router's HTTP Console.
There is a vulnerability in Apple devices that allows an attacker to create fake access points that successfully spoof real access points. This works by sending EAP-success messages that the Apple devices accept even before validating credentials. SILICA will exploit this vulnerability when creating a FakeAP with 802.1X encryption.
See SILICA in action by watching the latest videos from Vimeo.
866-524-4782 *
imu.sales@appgatedotcom