[Silica] SILICA v7.43
oren at immunityinc.com
oren at immunityinc.com
Tue Apr 20 13:11:47 UTC 2021
Immunity is proud to announce the release of SILICA v7.43!
- Known beacons attack
+ Many modern operating systems are not vulnerable to standard "karma"
attacks as they passively scan for known open networks instead of
broadcasting probe requests. In the "known beacons attack", beacons
advertising ESSIDs from a list of known common network names are
broadcasted. This attack is effective because many operating system
default to auto-connecting to known open networks. This attack has
been implemented in SILICA as an enhancement to the "karma" module,
and it is launched from the "FakeAP settings" dialog box. There is a
predefined common ESSIDs list, and a custom list can be loaded from
the "PREFERENCES/Module Config" dialog box.
- Improved Deauthentication Attack
+ SILICA now supports deauthenticating all stations from a BSS even
when another module is running. The attack is launched from the
"Network Listing" tab, by selecting the "DoS: Deauthenticate All
Clients". The only limitation is that if the attack is launched while
another module is running, then the target network must be in the
same channel as the current wireless channel. This improvement is
specially intended to be used together with the FakeAP module.
- Probe Requests MAC Randomization Handling
+ MAC randomization in probe requests was introduced by operating
system vendors to enhance privacy. As a result, SILICA probe
visualizations were confusing after scanning for a certain period, as
too many MAC addresses were displayed. SILICA now groups together
probe requests in the FakeAP tab by ESSID and hide the MAC address by
default. In the "Neighborhood Graph" visualization, SILICA groups
together MAC addresses that had only proved the same ESSID. MAC
address that were seen in other interactions are still displayed
individually.
To view a demonstration of the new features visit:
https://vimeo.com/537915679
Videos can be found at:
WPA traffic decryption using the Kr00k Attack -
https://vimeo.com/481719308
Network Printer Attacks -
https://vimeo.com/270182796
Bypassing WPA2 encryption using the KRACK attack -
https://vimeo.com/251369829
SILICA 7.31: Samba Server Exploitation -
https://vimeo.com/230656937
D-link and Microsoft WSUS Exploits -
https://vimeo.com/209259981
Fake Captive Portal Demo -
https://vimeo.com/198045435
Malicious Access Point Detection -
https://vimeo.com/177231337
Karma attack filtering and background WPA handshake sniffer -
https://vimeo.com/165882825
Access Point Mapping - https://vimeo.com/157178038
Full Karma Attack - https://vimeo.com/155393829
SMB proxy and group policy exploit - https://vimeo.com/136964755
SSL attacks using SSL stripping and self signed certificates -
https://vimeo.com/122117823
Exploiting Android WebView.addJavaScriptInterface -
http://vimeo.com/109831748
Pixie Dust WPS Attack - https://vimeo.com/130883860
More WPS attacks - https://vimeo.com/album/3385057/video/115337910
General overview -
http://www.immunityinc.com/movies/SILICA_7.5_New_Features.mov
Wireless Window -
http://www.immunityinc.com/movies/SILICA_Wireless_Window.mp4
SILICA Team
More information about the SILICA
mailing list