This includes code to exploit the newly found WPS vulnerability to guess the pin and recover the WPA key for access points without having to follow the traditional approach of brute forcing it. Several configuration options are in preferences under the Wireless Cracking section, which allow resuming or specifying ranges if you know what the vendor commonly uses.
It must be noted this is an early version of the attack, a better one with more features will be released soon.
See SILICA in action by watching the latest videos from Vimeo.
866-524-4782 *
imu.sales@appgatedotcom