[Silica] SILICA v7.16

Alex Iliadis alex at immunityinc.com
Fri May 3 09:52:20 EDT 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Immunity is proud to announce the release of SILICA v7.16!

- - Added exploit for Java Dynamic Type Binding Remote Code Execution
(CVE-2013-2423)
  Modules extended:
   + Become this network with client side injection:
     - AP mode
     - Ad-Hoc mode
   + Man-In-The-Middle with client sides
   + Passive session hijacking selectively attack a client

- - Bug fixes in service impersonation modules


Videos can be found at:

Password stealing -
http://partners.immunityinc.com/movies/Silica-BrowserAutoFill-Take2.mov
AP less WEP cracking -
http://silica.immunityinc.com/AP_less_WEP_cracking.mov
Access point impersonation -
http://partners.immunityinc.com/movies/Access_point_impersonation.mp4
Custom traffic injection -
http://partners.immunityinc.com/movies/Traffic_injection.mp4
General overview -
http://www.immunityinc.com/movies/SILICA_7.5_New_Features.mov
Wireless Window  -
http://www.immunityinc.com/movies/SILICA_Wireless_Window.mp4
Key retrieval (WEP, LEAP, WPA1,2) -
http://partners.immunityinc.com/movies/Lightning_Demo_SilicaU02.mp4
Passive session hijacking (facebook, twitter, gmail etc) -
http://partners.immunityinc.com/movies/Lightning_Demo_SilicaU_01.mp4


SILICA Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlGDwRQACgkQ1j41DNEdEgiXVgCfVDGNFjWbbR+UF0yWNCwKbvcL
eJsAn1NkhEbNYIi4ErJRGe1+wxqVakmM
=oiha
-----END PGP SIGNATURE-----


More information about the SILICA mailing list