[Silica] SILICA v7.43

oren at immunityinc.com oren at immunityinc.com
Tue Apr 20 13:11:47 UTC 2021


Immunity is proud to announce the release of SILICA v7.43!

- Known beacons attack 

 + Many modern operating systems are not vulnerable to standard "karma"
 attacks as they passively scan for known open networks instead of 
 broadcasting probe requests. In the "known beacons attack", beacons 
 advertising ESSIDs from a list of known common network names are 
 broadcasted. This attack is effective because many operating system 
 default to auto-connecting to known open networks. This attack has 
 been implemented in SILICA as an enhancement to the "karma" module, 
 and it is launched from the "FakeAP settings" dialog box. There is a 
 predefined common ESSIDs list, and a custom list can be loaded from 
 the "PREFERENCES/Module Config" dialog box.

- Improved Deauthentication Attack 

 + SILICA now supports deauthenticating all stations from a BSS even
 when another module is running. The attack is launched from the 
 "Network Listing" tab, by selecting the "DoS: Deauthenticate All 
 Clients". The only limitation is that if the attack is launched while 
 another module is running, then the target network must be in the 
 same channel as the current wireless channel. This improvement is 
 specially intended to be used together with the FakeAP module.  


- Probe Requests MAC Randomization Handling 

 + MAC randomization in probe requests was introduced by operating 
 system vendors to enhance privacy. As a result, SILICA probe 
 visualizations were confusing after scanning for a certain period, as 
 too many MAC addresses were displayed. SILICA now groups together 
 probe requests in the FakeAP tab by ESSID and hide the MAC address by 
 default. In the "Neighborhood Graph" visualization, SILICA groups 
 together MAC addresses that had only proved the same ESSID. MAC 
 address that were seen in other interactions are still displayed 
 individually. 

To view a demonstration of the new features visit:
https://vimeo.com/537915679

Videos can be found at:
WPA traffic decryption using the Kr00k Attack -
https://vimeo.com/481719308
Network Printer Attacks -
https://vimeo.com/270182796
Bypassing WPA2 encryption using the KRACK attack -
https://vimeo.com/251369829
SILICA 7.31: Samba Server Exploitation - 
https://vimeo.com/230656937
D-link and Microsoft WSUS Exploits -
https://vimeo.com/209259981
Fake Captive Portal Demo -
https://vimeo.com/198045435
Malicious Access Point Detection -
https://vimeo.com/177231337
Karma attack filtering and background WPA handshake sniffer -
https://vimeo.com/165882825
Access Point Mapping - https://vimeo.com/157178038
Full Karma Attack - https://vimeo.com/155393829
SMB proxy and group policy exploit - https://vimeo.com/136964755
SSL attacks using SSL stripping and self signed certificates -
https://vimeo.com/122117823
Exploiting Android WebView.addJavaScriptInterface -
http://vimeo.com/109831748
Pixie Dust WPS Attack - https://vimeo.com/130883860
More WPS attacks - https://vimeo.com/album/3385057/video/115337910
General overview -
http://www.immunityinc.com/movies/SILICA_7.5_New_Features.mov
Wireless Window  -
http://www.immunityinc.com/movies/SILICA_Wireless_Window.mp4


SILICA Team



More information about the SILICA mailing list