[Silica] SILICA v7.16
Alex Iliadis
alex at immunityinc.com
Fri May 3 09:52:20 EDT 2013
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Immunity is proud to announce the release of SILICA v7.16!
- - Added exploit for Java Dynamic Type Binding Remote Code Execution
(CVE-2013-2423)
Modules extended:
+ Become this network with client side injection:
- AP mode
- Ad-Hoc mode
+ Man-In-The-Middle with client sides
+ Passive session hijacking selectively attack a client
- - Bug fixes in service impersonation modules
Videos can be found at:
Password stealing -
http://partners.immunityinc.com/movies/Silica-BrowserAutoFill-Take2.mov
AP less WEP cracking -
http://silica.immunityinc.com/AP_less_WEP_cracking.mov
Access point impersonation -
http://partners.immunityinc.com/movies/Access_point_impersonation.mp4
Custom traffic injection -
http://partners.immunityinc.com/movies/Traffic_injection.mp4
General overview -
http://www.immunityinc.com/movies/SILICA_7.5_New_Features.mov
Wireless Window -
http://www.immunityinc.com/movies/SILICA_Wireless_Window.mp4
Key retrieval (WEP, LEAP, WPA1,2) -
http://partners.immunityinc.com/movies/Lightning_Demo_SilicaU02.mp4
Passive session hijacking (facebook, twitter, gmail etc) -
http://partners.immunityinc.com/movies/Lightning_Demo_SilicaU_01.mp4
SILICA Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iEYEARECAAYFAlGDwRQACgkQ1j41DNEdEgiXVgCfVDGNFjWbbR+UF0yWNCwKbvcL
eJsAn1NkhEbNYIi4ErJRGe1+wxqVakmM
=oiha
-----END PGP SIGNATURE-----
More information about the SILICA
mailing list